Abstracts

Document Sample
Abstracts Powered By Docstoc
					1        DESIGN AND
         IMPLEMENT AT ION OF
         BRANCH LINE COUPLER

                                                This paper is a discussion on the feed network designed for the Quadrifilar Helix Antenna
                                                (QHA) which consists of a 90 degree hybrid combination. It is designed for the Quadrifilar Helix
                                                Antenna (QHA).The QHA requires each arm to be fed 90 degree out of phase with that before
                                                it. In order to achieve this a phasing feed network is required. This network must have four
                                                outputs of equal magnitude and phase 90 degree, 180 degree, 270 degree and 360 degree.
                                                There are a number of ways of achieving this. To provide the 90 degree phase difference, a
                                                Branch Line Coupler is designed. The coupler is created using microstrip line. A branch line
                                                coupler produces two equal magnitude outputs 90 degree out of phase. The branch line
                                                coupler (90 degree hybrid) means that it has one input which is split into two, equal
                                                magnitude outputs that are 90 degree out of phase. It consists of a square with sides equal to
                                                λ/4 or a circle of circumference 1λ. The parallel sections have a characteristic impedance of
                                                Zo/√2 and the series sections have a characteristic impedance of Zo.                                 Antennas                 chinnu jacob
         Reversible Watermarking
         using Binary T ree Approach            In this paper, a reversible data hiding scheme based on histogram modification is presented. A
         Based on Histogram                     binary tree structure to solve the problem of communicating pairs of peak points is exploited.
         Modification                           Distribution of pixel differences is used to achieve large hiding capacity while keeping the
                                                distortion low. A histogram shifting technique is adopted to prevent overflow and underflow.                                  J.Srinivasarao
                                                Performance comparisons with other existing schemes are provided to demonstrate the                                           T. S. R. Krishna
    2                                           superiority of the proposed scheme.                                                                  Signal Processing        Prasad
         K-RLE:A new data
         compression algorithm for
         wireless sensor Embedded
         System for
         agro – industrial applications         The research work presents a development of the multi sensor embedded system for
                                                measuring sensor parameters optimized by appropriate algorithms. Since most of the
                                                industrial applications use the analog sensors with transmitters for sensing the process
                                                parameters particularly in harsh environment because of their strong mechanical packaging
                                                and ruggedness.. In this research work, I will evaluate and compare existing smart sensor
                                                systems performance with proposed system. The system uses the I2C protocol to interface the
                                                multi- channel ADC to the LPC-2148 ARM.
                                                In the context of the use of Wireless Sensor Network technology for environmental
                                                monitoring, the two main elementary activities of wire/wireless Sensor Network are data
                                                acquisition and transmission.however, transmitting/receiving data are power-
                                                consumingtask.In order to reduce transmission-associated power consumption, in this
                                                proposed project I explore and suggest data compression by processing information locally. In
                                                this research work, I will evaluate and compare compression algorithms on an ultra-low                                        VadrevuSimhadri
    3                                           power ARM micro-controller and industry driven embedded EDA tool kits.                               Embedded Systems         K Raghu ram
         Configurable OFDM
         Baseband Modulation                    The research work present development of OFDM base band modulation to improve the
         technique based on FPGA                transmission velocity in mulitipath fading wireless channel. The growth of mobile
                                                communications and wireless Internet access has produced a strong demand for advanced
                                                wireless techniques. The challenges for wireless communication designs come from the
                                                detrimental characteristics of wireless environments, such as mulitipath fading, Doppler effect,                              A A V V S N M Pavan
    4                                           co-channel interference, and intentional jamming in military communications.                         Antennas/OFDM            Kishore
         Increasing Safety of Bomb              During manned bomb disposal missions, the combination of the protective suit’s weight (37                                     M.Rajinee &R.V S
                                                kg), physical activity, high ambient temperatures, and restricted airflow can cause the                                       JagannadhaRao
         Disposal Missions: A Body
                                                operative’s temperature to rise to dangerous levels during missions impairing their physical
         Sensor Network Approach                and mental ability. This work proposes to use body sensor networks (BSNs) to increase the
                                                safety of operatives in such missions through detailed physiological monitoring, fusion of
                                                health information, and remote alerts. Previous trials conducted by the authors have shown
                                                no correlation between the suit wearer’s temperature at any single skin site and their core
                                                temperature, nor between single-point temperature variations and subjective thermal
                                                sensation. This
                                                paper reports on the development of a wearable, wireless,networked sensing system suitable
                                                for integration within the suit and deployment in manned missions. A sensor fusion and
                                                modeling approach is proposed that estimates the overall thermal sensation of the suit
                                                wearer, in real time, based on the multipoint temperature data. Zhang’s thermal sensation
                                                model was used in this work. Modeling is performed locally to enable cooling system
                                                actuation, provide local feedback, and accommodate application specific constraints.
                                                Experimentation with the prototype confirms the importance of multisite
                                                skin measurement, timely cooling actuation, and monitoring the operative’s thermal state.
                                                Evaluation of Zhang’s model highlights the need for a bespoke model to account for suit and
                                                mission specific factors. The deployed BSN has been evaluated through experimental trials
                                                using a number of subjects in mission-like
                                                conditions and has been shown to be appropriate for the target application.




    5                                                                                                                                                Bio Medical
         Carrier Based Carrier
         Frequency Offset Estimation            In this paper, we analyzed the feasibility of using a virtual carrier based carrier frequency
         Algorithm in the Presence of           offset estimation algorithm in the presence of I/Q imbalance in OFDM systems. Based on the
                                                analysis of the signal model with both receiver CFO and I/Q imbalance impairment we
         I/Q Imbalance in OFDM                  conclude that it is feasible to extending the virtual carrier based CFO estimation algorithm to
         Systems                                the I/Q imbalance scenario. The CFO estimation performance is evaluated through computer
                                                simulation. Impact of parameters on the estimation performance is investigated and it is
                                                consistent with our analysis. After CFO correction, a blind based I/Q imbalance estimation and
                                                compensation algorithm is applied. The final detection performance demonstrates that the
                                                virtual carrier based CFO estimation performance is good enough for subsequent I/Q
    6                                           imbalance estimation and compensation.                                                               Antennas/OFDM            K.JAGAN MOHAN
         A Novel Method for
         Symmetric Encryption using             Cryptography, defined as the science and study of secret writing, concerns the ways in which
                                                communications and data can be encoded to prevent disclosure of their contents through                                                       1
         Split Plaintext Key Pair                                                                                                                                             Renji th PR
                                                eavesdropping or message interception, using codes, ciphers and other methods, so that only
         Algorithm                              intended people can see the real message. In this paper, we propose the design and                                            ,Pra s eeda K
                                                implementation of a new symmetric key algorithm. The algorithm encrypts the plaintext file                                                       2
                                                                                                                                                                              Gopi na dha n
                                                by using the password of the file as the key. The plaintext and key are split in equal numbers
                                                and shift cipher is applied to each block of the plaintext. This new algorithm can be considered                              a nd Mi l a n
    7                                           as a hybrid approach to its precursors.                                                              Network Security         Seba s ti a n
         Simulation of Inter Carrier            Orthogonal Frequency Division Multiplexing is being widely used in wireless Communication
                                                systems. OFDM is very efficient in combating inter-symbol interference and can achieve
         Interference Cancellation
                                                high data rate in frequency selective channel. For OFDM communication systems, the
         T echnique for                         frequency offsets in mobile radio channels misrepresent the orthogonality between
         OFDM Systems                           subcarriers resulting in Inter Carrier Interference (ICI). ICI causes leakage of power
                                                among the subcarriers thus the system performance is degrading. The OFDM problem is its
                                                sensibility to frequency offset between the transmitted and received number of carrier
                                                frequencies. the two main effects are caused by frequency offset one is the reduction of
                                                signal amplitude in the output of the filters matched to each of the carriers and
                                                the second is introduction of ICI from the other carriers. This
                                                research work investigates three effective methods for combating the effects of ICI: ICI
                                                Self Cancellation (SC), Maximum Likelihood (ML) estimation, and Extended Kalman Filter
                                                (EKF) method. These three methods are compared in terms of bandwidth efficiency and bit
                                                                                                                                                                              M.Veera bra hm
                                                error rate performance. Through simulations, it is shown that these methods are effective in
                                                mitigating the modulation schemes, the ML and EKF methods perform better than the SC                                          a cha ri
    8                                           method.                                                                                              Antennas/OFDM            CH.Ra mba bu
         Performance Analysis of
         MCCDMA system in                       Multi-carrier code division multiple access (MCCDMA) is an attractive choice for high speed
         Rayleigh channel and AWGN              wireless communication as it avoids the problem of inter symbol interference (lSI) and also
                                                exploits frequency diversity. In order to support multiple users with high speed data
         channel using BPSK                     communications, the MC-CDMA technique is used to address these challenges. In this paper
         modulation technique                   working of Transmitter and Receiver model of MCCDMA system is presented. This work also
                                                derives simulation through MA TLAB of average bit error rate (BER) versus bit energy to noise
                                                ratio (Eb/No) of Multi Carrier Code Division Multiple Access (MC-CDMA) systems over Rayleigh
                                                channel using BPSK modulation and Additive White Gaussian Noise, which shows the reduction
                                                                                                                                                                                  V.SATISH,
                                                in BER performance. In this paper the performance of MCCDMA in Rayleigh and awgn channel                                          K.SURESH,
    9                                           is compared.                                                                                         Signal Processing             B.SWATI
         Bayesian Filtering algorithms          The ability to reliably and cheaply localize mobile terminals will allow users to understand
                                                and utilize the what, where and when of the surrounding physical world. Therefore, mobile
         for Mobile T erminal
                                                terminal location information will open novel application opportunities in many areas. The
         Positioning                            mobile terminal positioning problem is categorized into three different types according to the
                                                availability of (1) initial accurate location information and (2) motion measurement data.
                                                Location estimation refers to the mobile positioning problem when both the initial location
                                                and motion measurement data are not available. If both are available, the positioning
                                                problem is referred to as position tracking. When only motion measurements are available
                                                the problem is known as global localization. These positioning problems were solved within
                                                the Bayesian filtering framework in order to work under a common theoretical context. Filter
                                                derivation and implementation algorithms are provided with emphasis on the radio mapping
                                                approach. The radio maps of the experimental area have been created by a 3D deterministic
                                                radio propagation tool with a grid resolution of 5 m. Real-world experiments were conducted
                                                in a GSM network, deployed in a semi-urban environment, in order to investigate the
                                                performance of the different positioning algorithms



                                                                                                                                                                              B.Balaji, D.Laxman
    10                                                                                                                                               Antennas                 Rao
         Non-Uniform Rectangular     Bad landings are the number one cause for aircraft accidents. It is difficult for the pilot to
         Microstrip Array Antenna in estimate his aircraft’s altitude. An accurate Radio Altimeter could effectively
         Multilayered Media for C-   prevent landing accidents. Microstrip altimeter antennas replace
                                     horn antennas since they are lightweight, and can be shaped to
         Band Altimeter System
                                                fit various applications. Thus the aim of this work is to provide a
                                                miniature C-band microstrip 2x2 array patch antenna. The non-
                                                uniform array controls the RF beam direction from the
                                                antennaand controls sidelobes. Till date, many researchers have
                                                developed various techniques to enhance bandwidth and gain of
                                                microstrip antennas. Superstrate loading technique is used here
    11                                                                                                                                               Antennas                 Tessy A. Mathew
                                                McWiLL(Multi-carrier Wireless Information Local Loop) is a mobile wireless broadband access
                                                system. It is can provide both broadband data services and high quality VoIP voice
                                                simultaneously. McWiLL is an easily expandable future-proof wireless network solution that
                                                enables you to get the most return for your investment. McWiLL is the most advanced
                                                broadband wireless solution provided by Beijing Xinwei Telecommunications Technology, Inc.
                                                (Xinwei). The technology is based on SCDMA, and is known as Multicarrier Wireless
                                                information Local Loop (McWiLL). McWiLL combines SCDMA's traditional use in narrow-band
                                                voice and introduces a mobile broadband data service that ties into an IP-based core network.
                                                It is based on CS-OFDMA adaptive modulation, and uses dynamic channel allocation and smart
                                                antennas to enhance its throughput. McWiLL has been deployed in several Chinese cities,
                                                including Guangzhou and Qingdao, where it's been used for video, voice and data
                                                communication.


    12   McWill for Rural Telecom Market                                                                                                             Wireless Communication   AJAL.A.J


                                                       Generally in industries there is traditional network communication s like RS232, RS485,
                                                etc. are limited for short distances. But the use of intelligent protocol converter provides the
                                                practicable solution. The Controller Area Network (CAN) is an International Standardization
                                                Organization (ISO) defined serial, asynchronous, multi-master communications bus originally
                                                developed for the automotive industry to replace the complex wiring harness with a two-wire
                                                bus. The specification calls for high immunity to electrical interference and the ability to self-
                                                diagnose and repair data errors. CAN was designed for automotive and industrial applications
                                                needing high levels of data integrity and data rates of up to 1 Mbit/s. Today the CAN bus is
                                                also used as a field bus in general automation environments; primarily due to the low cost of
                                                some CAN Controllers and processors. CAN bus will be increasingly used in wide range of
                                                applications for its superiority. A need arises when using CAN buses to monitor the data on
                                                the bus as well as having the ability to inject further data onto it. This provides the ability to
                                                fully test a CAN network on both the frame level and the bit level. A low cost and portable
                                                CAN bus analyzer is requiring testing or Monitoring the CAN bus in the fields.
                                                     In this project we are implementing a RS232 based CAN Bus Network analyzer based on
                                                ARM7 using acceptance filter concept. ARM7 (LPC2129) microcontroller having two
                                                interconnected CAN interfaces with advanced acceptance filters. By using lpc2129
                                                microcontroller receive the data CAN bus, convert the data in serial format and transfer the
                                                data to Personal computer(PC) or Laptop using RS232 serial port or virtual serial port. A CAN
                                                transceiver MCP2551 is a high-speed CAN, fault-tolerant device that serves as the interface
                                                between a CAN protocol controller and the physical bus. The MCP2551provides differentials
                                                transmit and receive capability for the CAN protocol controller and is fully compatible with
         Designing and Development              the ISO-11898 standard. The CAN BUS Analyzer is a simple to use low cost CAN bus monitor
                                                                                                                                                                              NANNAPANENI SIVA
                                                which can be used to develop and debug a high speed CAN network. The device supports CAN
         of a CAN Bus analyzer for              2.0b and ISO11898-2 and a broad range of functions which allow it to be used across various                                   PARVATHI, &
         industrial applications using          market segments including automotive, industrial, medical and marine.                                                         Mr.
    13   ARM                                                                                                                                         Microcontroller          RAMANJANEYULU
                                                Adders are heart of computational circuits and many complex arithmetic circuits are based on
                                                the addition. Several variants of different logic styles have been proposed to implement 1-bit
                                                adder cells. These adder cells are commonly aimed to reduce power consumption and increase
                                                speed. . For mobile applications, designers have to work within a very tight leakage power
                                                specification in order to meet product battery life and package cost objectives. Some
                                                performance criteria are considered in the design and evaluation of adder cells, such as
                                                leakage power, active power, ground bounce noise, area, noise margin and robustness with
                                                respect to voltage and transistor scaling as well as varying process and compatibility with
                                                surrounding circuitries. It is very important to develop design techniques to reduce static
         A LOW LEAKAGE 1-BIT                    power dissipation during periods of inactivity to conserve power. The power reduction must
         NANO-CMOS BASED FULL                   be achieved without trading-off performance which makes it harder to reduce leakage during
                                                normal (runtime) operation. Power gating is one such well known technique where a sleep
         ADDER CELLS FOR MOBILE
                                                transistor is added between actual ground rail and circuit ground. This device is turned off in
         APPLICATIONS WITH                      the sleep mode to cut-off the leakage path further peak of ground bounce noise is possible
         GROUND BOUNCE NOISE                    with improved staggered phase damping technique. In this project we will design and analyze
    14   REDUCTION                              the nano-CMOS full adder circuit and compare its performance with the conventional full              VLSI                     Roshni Polly
         SAR Distributions for
         Multiple T owers                       the aim of this paper is to develop a protocol for, future SAR measurement from multiple
                                                towers. From the current knowledge base available, we have proposed procedures for the
                                                measurement of SAR and Variation depending on a number of factors like distance from the
                                                tower, number of tower in the vicinity, age, etc.
                                                This paper describes the effect of the field distribution stemming from multiple transmit
                                                antennas on a single handset. The purpose of the experiment is to analyze the SAR effect from
                                                multiple transmit antennas on one single board.                                                                               Jacob Abharam and
    15                                                                                                                                               Antennas                 Vipeesh P
                                                This paper studies the achievable rates of the multi-antenna or
         The Maximum Achievable                 multiple-input multiple-output (MIMO) secrecy channel with
         Secrecy Capacity of the                multiple single-/multi-antenna eavesdroppers. By assuming
         Auxiliary multi Antenna CR             Gaussian input, the maximum achievable secrecy rate is
         Channel                                obtained with the optimal transmit covariance matrix that
                                                maximizes the minimum difference between the channel mutual
                                                information of the secrecy user and those of the eavesdroppers.
                                                The maximum secrecy rate computation can thus be formulated
                                                as a non-convex max-min problem, which cannot be solved
                                                efficiently by existing methods. To handle this difficulty, In this
                                                paper we may utilize the relationship between the secrecy
                                                channel and the recently developed cognitive radio (CR)
                                                channel, in which the secondary user transmits over the same
                                                spectrum simultaneously with multiple primary users, subject to
                                                the received interference power constraints at the primary users,
                                                or the so-called “interference temperature (IT)” constraints. By
                                                developing an auxiliary multi-antenna CR channel that has the
                                                same channel responses as the secrecy channel, where the                                                                      Dr. Aruna Mastani &
    16                                          optimal transmit covariance to achieve the maximum secrecy                                           Antennas/MIMO            M Nagendra Naik
                                                Miniaturized microstrip 180 degree hybrid coupler is proposed.
         Miniaturized 180 Degree
                                                The coupler offers a bandwidth of 55% in the UHF band. The
         Hybrid Coupler
                                                size of the coupler implemented in the multi-section
                                                configuration was reduced to 34% of the traditional multi-
                                                sectioned coupler at this frequency. The size reduction was
                                                achieved by folding the transmission lines. The curved lines of
                                                the hybrid ring coupler act as mitre bends which compensates for
                                                the folds.
                                                These couplers find a wide range of application in the feed of
                                                circularly polarized antennas. The size reduction helps these
                                                couplers to be implemented in array antennas where elements
                                                spacing are less.
    17                                                                                                                                               Antennas                 Asha Susan John
                                                This paper presents a novel, integrated a photonic antenna with
         Wireless Communication
                                      a power control scheme. The controller regulates the levels of
         with Smart Photonic
                                      radiated power by adjusting the biasing voltage of a side-
         Antennas using T ransmission illuminated waveguide photo detector (WGPD). The WGPD
         Power Control                converts the RF-modulated optical power into a microwave
                                                signal, which is then fed to an antenna. The controller uses as
                                                input the noise level measurements of a different receiving
                                                antenna, and periodically calculates the necessary amount of
                                                power that must be radiated. The performance of the
                                                RF/photonic device has been studied theoretically and in
                                                simulation. With the addition of power control capabilities, the
                                                device realizes an early attempt to design smart photonic                                                                     Neethu P S,
    18                                          antennas.                                                                                            Optical/Antennas         Dr.Suresh Babu
         Carrier Frequency Offset
         Estimation Algorithm in the
                                                    In this paper, we analyzed the feasibility of using a virtual carrier based carrier frequency
         Presence of I/Q Imbalance in
                                                offset estimation algorithm in the presence of I/Q imbalance in OFDM systems. Based on the
         OFDM Systems                           analysis of the signal model with both receiver CFO and I/Q imbalance impairment we
                                                conclude that it is feasible to extending the virtual carrier based CFO estimation algorithm to
                                                the I/Q imbalance scenario. The CFO estimation performance is evaluated through computer
                                                simulation. Impact of parameters on the estimation performance is investigated and it is
                                                consistent with our analysis. After CFO correction, a blind based I/Q imbalance estimation and
                                                compensation algorithm is applied. The final detection performance demonstrates that the
                                                virtual carrier based CFO estimation performance is good enough for subsequent I/Q
                                                imbalance estimation and compensation.

                                                Index Terms—Carrier frequency offset (CFO), In-phase and quadrature-phase (I/Q) imbalance,                                    K.JAGAN
                                                orthogonal frequency division multiplexing (OFDM), virtual carrier                                                            MOHAN,K.Suresh &
    20                                          Clustering analysis is the problem of partitioning a set of objects O = {o1… on} into c self-
                                                                                                                                                     Antennas/OFDM            J.Durga Rao
         A Comparative study of                 similar subsets based on available data. In general, clustering of unlabeled data poses three
         Cluster Analysis with                  major problems: 1) assessing cluster tendency, i.e., how many clusters to seek? 2) Partitioning
                                                the data into c meaningful groups, and 3) validating the c clusters that are discovered. We
         Extended Dark Block
                                                address the first problem, i.e., determining the number of clusters c prior to clustering. Many
         Extraction and Cluster Count           clustering algorithms require number of clusters as an input parameter, so the quality of the
         Extraction                             clusters mainly depends on this value. Most methods are post clustering measures of cluster
                                                validity i.e., they attempt to choose the best partition from a set of alternative partitions. In
                                                contrast, tendency assessment attempts to estimate c before clustering occurs. Here, we
                                                represent the structure of the unlabeled data sets as a Reordered Dissimilarity Image (RDI),
                                                where pair wise dissimilarity information about a data set including ‘n’ objects is represented
                                                as nxn image. RDI is generated using VAT (Visual Assessment of Cluster tendency), RDI
                                                highlights potential clusters as a set of “dark blocks” along the diagonal of the image. So,
                                                number of clusters can be easily estimated using the number of dark blocks across the                                         Srinivasulu
                                                diagonal. We develop a new method called “Extended Dark Block Extraction (EDBE) for                                           Asadi,Dr.Ch.D.V.Sub
    21                                          counting the number of clusters formed along the diagonal of the RDI. EDBE method combines
                                                Clustering is the process of partitioning the data set into subsets called clusters, so that the
                                                                                                                                                     Sensor Networks          ba Rao,V.Saikrishna
         Clustering the Labeled and             data in each subset share some properties in common. Clustering is an important tool to
         Unlabeled Datasets using               explore the hidden structures of modern large Databases. Because of the huge variety of the
                                                problems and data distributions, different classical clustering algorithms, such as hierarchical,
         New MST based Divide and
                                                partitional, density-based and model-based clustering approaches, have been developed and
         Conquer T echnique                     no techniques are completely satisfactory for all the cases. Sufficient empirical evidences have
                                                shown that a New Minimum Spanning Tree (NMST) representation is quite invariant to the
                                                detailed geometric changes in cluster boundaries. Therefore, the shape of a cluster has little
                                                impact on the performance of MST - based clustering algorithms, which allows us to overcome
                                                many of the problems faced by the classical clustering algorithms. NMST - based clustering
                                                algorithms also have the ability to detect clusters with irregular boundaries and so they are
                                                being widely used in practice. In these MST - based clustering algorithms, search for nearest
                                                                                                                                                                              Srinivasulu Asadi,
                                                neighbour is to be done in the construction of NMST. This search is the main source of
                                                computation and the standard solutions take O(N2) time. In our paper, we present a fast                                       Dr.Ch.D.V.Subba
                                                minimum spanning tree-inspired clustering algorithm. This algorithm uses an efficient                                         Rao, V.Saikrishna
    22                                          implementation of the cut and the cycle property of the NMST, that can have much better              Sensor Networks          and Bhudevi Aasadi
                                                Clustering analysis is the task of partitioning a set of objects O = {O1… On} into C self-similar
         Finding the Number of                  subsets based on available data. In general, clustering of unlabeled data poses three major
         Clusters in Unlabelled                 problems: 1) Assessing cluster tendency, i.e., how many clusters to seek? 2) Partitioning the
         Datasets Using                         data into C meaningful groups, and 3) Validating the c clusters that are discovered. All
                                                clustering algorithms ultimately rely on one or more human inputs, and the most important
         Extended Cluster Count                 input is number of clusters (C) to seek. There are many pre and post clustering methods which
         Extraction (ECCE)                      relieves the user from this choice. These methods ultimately make the choice by thresholding
                                                some value in the code. Thus, the choice of c is transferred to the equivalent choice of the
                                                hidden threshold that determines C "automatically". In contrast, tendency assessment
                                                attempts to estimate c before clustering occurs. Here, we represent the structure of the
                                                unlabeled data sets as a Reordered Dissimilarity Image (RDI) where pair wise dissimilarity
                                                                                                                                                                                Srinivasulu Asadi,
                                                information about a data set including ‘n’ objects is represented as n x n image. RDI is
                                                generated using VAT (Visual Assessment of Cluster tendency), which highlights potential                                         Dr.Ch.D.V.Subba
                                                clusters as a set of “dark blocks” along the diagonal of the image, so that number of clusters                                Rao, O.Obulesu and
    23                                          can be easily estimated using the number of dark blocks across the diagonal. We develop a            Sensor Networks          P.Sunil Kumar Reddy
         A SCHEDULING
         ST RAT EGY FOR T IME
         T RIGGERED SYST EMS                    Scheduling in an embedded system has been researched for long in the recent past. Number of
                                                scheduling algorithms proposed and implemented for particular applications. As the time
                                                triggered paradigm is taking control in safety critical applications, progressively change in
                                                scheduling strategies has came up, in this move we propose a naive scheduling strategy.
                                                Considering a non pre-emptive execution environment in which the activation of processes and
                                                communications is triggered at certain point of time, we generated a schedule table and
                                                derive a worst case delay which is guaranteed under any condition. Such a scheduling policy
                                                will be suited for safety critical application class. For evaluation of our proposed algorithm, we                            B Abdul Rahim, Dr. K
                                                used conditional process graphs generated and the average & maximum percentage                                                Soundara Rajan and
    24                                          deviations of the schedule lengths are calculated.                                                   Sensor Networks          K Ramana


                                                The existing web referral system coupled with reliable persistent referral service architecture
                                                (“PRS”) is indeed an onslaught for attackers launching DDoS attacks on popular web servers.
                                                Using the proposed method PRS can enhance its referral service to normal users too. A
                                                centralized referral service could be implemented in search engines for providing valid clients
                                                a privilege channel to target websites, during DDoS attacks. Referral service needs to be
         Unified Protection                     secured from comprised referrers as well as malicious valid clients. The existing reliability of
                                                popular search engines like Google, Yahoo etc. can be utilized for providing value-added
         System to avert DDoS                   service to important web servers. Our method provides referrers only URL of a third party
         and Phishing Attacks                   server, which is trusted and registered by target servers. The third party server after
                                                verification of encrypted key given to source server by target servers, will be forwarding the
         using Persistent Referral              traffic from valid clients to target site. A simple phishing mechanism is also proposed along
    25   Service                                with the source search server.                                                                       Network Security         Ramesh R
     Interference Free
     Communication Coverage
     and Improved lifetime of                  System lifetime of wireless sensor networks (WSN) is inversely proportional to the energy
                                           consumed by critically energy-constrained sensor nodes during RF transmission. In that regard,
     WPSN                                  modulated backscattering (MB) is a promising design choice, in which sensor nodes send their
                                           data just by switching their antenna impedance and reflecting the incident signal coming from
                                           an RF source. Hence, wireless passive sensor networks (WPSN) designed to operate using MB
                                           do not have the lifetime constraints of conventional WSN. However, the communication
                                           performance of WPSN is directly related to the RF coverage provided over the field the
                                           passive sensor nodes are deployed. In this letter, RF communication coverage in WPSN is
                                           analytically investigated. The required number of RF sources to obtain interference-free
                                           communication connectivity with the WPSN nodes is determined and analyzed in terms of
                                           output power and the transmission frequency of RF sources, network size, RF source and
                                           WPSN node characteristics.

26                                         Ad hoc wireless networks are the category of wireless                                                 Sensor Networks          srikanta nallapenani
     Performance Comparisons               networks that utilize multi-hop radio relaying and are capable of
     of ZRP and IZRP Routing               operating without the support of any fixed infrastructure. Based
                                           on the routing information update mechanism Ad hoc wireless
     Protocols for Ad Hoc                  networks routing protocols are classified into Proactive, Reactive
     Wireless Networks                     and Hybrid Routing Protocols. Out of these, Hybrid Routing
                                           Protocol combines the best futures of the first two categories.
                                              The Zone Routing Protocol(ZRP) implements hybrid routing
                                           by every network node proactively maintaining routing
                                           information about its routing zone, while reactively acquiring
                                           routes to destinations beyond the routing zone. In this paper, we
                                           proposed the Independent Zone Routing Protocol (IZRP) an
                                           enhancement of the Zone Routing Protocol which allows adaptive
                                           and distributed configuration for the optimal size of each node’s
                                           routing zone, on per-node basis. We demonstrate the
                                           performance of IZRP with various performance metrics.
                                           Furthermore, we compared the performance of IZRP and ZRP
                                           by considering performance metrics Packet Delivery Fraction,
                                                                                                                                                                          Dilli Ravilla
                                           Normalized Routing Overhead and End-to-End Delay.
                                           Keywords—Ad hoc wireless network, hybrid routing , Zone                                                                        ,V.Sumalatha,Dr
                                           Routing Protocol, Independent Zone Routing, routing zone, IZR                                                                  Chandra Shekar
27                                                                                                                                               Mobile Networks          Reddy Putta
     T IME-
     SYNCHRONIZAT ION
     LOCALIZAT ION IN
                                           In This Paper we Propose on Time-Synchronization localization in large scale underwater
     LARGE SCALE                           sensor-network. We use the Basic Time-synchronization free localization technique for small
     UNDERWAT ER SENSOR                    area. Same technique used In Large scale localization in under water sensor for large area.
                                           We then introduce a localization scheme specifically designed for large scale underwater
     NET WORKS                             sensor networks. The proposed localization scheme does not relies on time-differences of
                                           arrival (TDoA) measured locally at a sensor to detect range differences from the sensor to
                                           three anchors that can mutually hear each other. We consider variations in the speed of sound
                                           and analyze the performance of the proposed scheme in terms of the number of localized
                                           nodes, location errors, and the number of reference nodes. Considering that depth
                                           information is typically available for underwater sensors, we transform the 3D underwater                                      Mr.T.S.Yenganti,
28                                         positioning problem into its two-dimensional counterpart via a projection technique.                  Sensor Networks          Prof.R.K.Krishna
     Real T ime Monitoring of              A remote compact sensor system for the detection of human vital signs (heartbeat and
     Human Heartbeat,                      respiration rate) is presented. It consists of four sensors which are used to monitor the health
     T emperature, Respiration             of the patient and the surrounding environment. HSM20, LM35 LM358 and MAR953-00 are
                                           the sensors which are used to detect the patient and his surrounding conditions. GPS and GSM
     Rate and Humidity Using
                                           system are used to know the condition of the patient and to track down the position of the
     GSM and GPS tracking                  patient. With this system in case of emergency the doctor can monitor the patient health                                       Bhavya.M,
29   system.                               condition from different location.                                                                    Bio Medical              B.Vijay Kumar
     EXPLORING T HE
     POSSIBILIT IES OF
     FINANCIAL INCLUSION
     T HROUGH MOBILE                       Technology is the key for financial inclusion because that is the only way to reduce the cost
     PHONE T ECHNOLOGY:                    significantly and reach the masses. But all technologies are not suitable for financial inclusion
                                           due to affordabiltiy, accessibility, security and privacy. In the last decade, mobile phone
     AN INDIAN PERSPECT IVE                technology has emerged as the most potential and well suited channel for financial inclusion.
                                           Use of mobile phone for inclusive finance is very popular in countries where most of the
                                           population is unbanked or underbanked. Indian government has also realized that mobile
                                           phone can be an important mode for propagation of financial inclusion in the country. As a
                                           result, Indian government has already taken many initiatives to promote mobile banking as a
                                           tool to expand the credit and financial services to the excluded populations. But, mobile phone,
                                           although a critical tool of financial inclusion, does not guarantee adoption, it only indicates
                                           potential. There are many challenges in adoption and successful implementation of mobile
                                           technology especially in rural areas. In the present paper an attempt has been made to
                                           explore the potential of mobile phone technology in accelerating financial inclusion in India.
                                           The paper also highlights pitfalls of the mobile technology for financial inclusion. Further,
                                           paper makes an attempt to discuss the policy options, which needs to be done to ensure                                         Dr. Sumanjeet,
30                                         equitable access to financial services for all who want it.                                           Mobile Communication     Minakshi Paliwal
     Operating System for                  we are going to use a research project called Nephele for efficient parallel data processing in
     Multicore and Clouds:                 clouds. Nephele is a data processing framework for dynamic resource allocation which are
     Mechanisms and                        done by IaaS clouds for both, task scheduling and execution. For each and every processing job
                                           we have a particular task which is given automatically to the virtual machines to initiate the
     Implementation
                                           job perform and terminate the job.
                                           Index Terms—Many-task computing, high-throughput computing, loosely coupled applications,
                                           cloud computing.                                                                                                               Saranya.S (M.E)
31                                                                                                                                               Cloud Computing          Nagamani.P
                                           OFDM is a multi carrier modulation technique in
     Novel Core Processor Blocks           which the carriers are Orthogonal to each others as a result of
     of OFDM System                        which it provides high bandwidth efficiency and multiple
                                           carriers share the data among themselves. This paper describes
     Using VHDL
                                           the design and implementation of Enhanced Core Processing
                                           Blocks of OFDM Transmitter and Receiver i.e. the FFT and
                                           IFFT Blocks that can be easily ported to an FPGA or an ASIC.
                                           The methodology used is the 8-point IFFT/FFT DIF with radix-2.
                                           The design unit consists of a common pass module and multiple
                                           path modules for which the timing simulations have been
                                           generated using Altera Max plus II. Finally the performance
                                           analysis of the implemented system has been done by
                                           comparisons with MATLAB Simulations.

                                           Keywords— OFDM, FFT, IFFT, Pass and Path                                                                                       Poonam
32                                                                                                                                               OFDM/Signal Processing   Agrawal,Vikas Gupta


                                           We survey systems for location monitoring in wireless sensor networks which at the same
     Study of privacy-                     time also preserve the privacy of the monitored locations. We look at algorithms for
                                           anonymization that allow for location monitoring and at the same time preserve the privacy
     preserving location
                                           of the monitored locations. We look at various ways of preserving anonymity in location-
     monitoring systems for                based services. We look at the applications of systems that enable location monitoring and
33   w ireless sensor netw orks            also preserve privacy. We also list the future directions for research in this area.                  Sensor Networks          Nagaraj SV,
     Lossy Compression and                 This work proposes a novel scheme for lossy compres-
                                           sion of an encrypted image with flexible compression ratio. A pseu-
     Iterative Reconstruction for
                                           dorandom permutation is used to encrypt an original image, and
     Encrypted Image                       the encrypted data are efficiently compressed by discarding the ex-
                                           cessively rough and fine information of coefficients generated from
                                           orthogonal transform. After receiving the compressed data, with
                                           the aid of spatial correlation in natural image, a receiver can re-
                                           construct the principal content of the original image by iteratively
                                           updating the values of coefficients. This way, the higher the com-
                                           pression ratio and the smoother the original image, the better the
                                           quality of the reconstructed image.
                                           Index Terms—Image compression, image encryption, imag
34                                                                                                                                               Image Processing         sebin joy
                                           Mobile ad hoc networks (MANETs) are usually formed without any major infrastructure. As a
     A DYNAMIC ANOMALY                     result, they are relatively vulnerable to malicious network attacks, and therefore, security is
     DET ECT ION SCHEME                    a more significant issue than infrastructure-based wire-less networks. AODV is the most
                                           popular routing protocols for MANET The two types of attacks on AODV are Routing request
     FOR AODV( AD hoc ON
                                           attack and Resource Consumption attack .In the literature, there are several proposals to
     DEMAND DIST ANCE                      detect such malicious hosts inside the network. In those methods, a baseline profile, which is
     VECT OR) BASED                        defined as perstatic training data, is usually used to verify the identity and the topology of
     MOBILE AD HOC                         the network, thus preventing any malicious host from joining the network. Since the topology
                                           of a MANET dynamically changes, the mere use of a static baseline profile is not efficient. This
     NET WORKS
                                           paper proposes a new anomaly-detection scheme based on a dynamic learning process that
                                           allows the training data to be updated at particular time intervals .The dynamic learning
                                           method is based on a statistical decision theory that calculates the multidimensional
                                           projection distance between the current and normal states of the targeted host. To
                                           differentiate an attack state from the normal state, the proposed system have defined multidi-
                                           mensional features based on statistical theory. The proposed system demonstrates an
35                                         effective performance in terms of high DRs and low FPRs against the two most prominent                Mobile Networks          Teenu S John
                                                                             A wireless sensor network (WSN) consists of spatially
                                           distributed autonomous sensors. Wireless sensor networks are often deployed in hostile
                                           environments, where the adversary is able to capture certain sensors. Due to the unattended
                                           nature of wireless sensor networks, an adversary can capture and compromise sensor nodes,
                                           and then he can use them to inject fake data, disrupt network operations, and eavesdrop on
                                           network communications. The particular dangerous attack is the replica attack. The attacker
                                           generate replicas of those nodes, and mount a variety of attacks with the replicas he injects
                                           into the network. These attacks are dangerous because they allow the attacker to leverage
     FAST DETECTION OF MOBILE              the compromise of a few nodes to exert control over much of the network. Several replica
                                           node detection schemes have been proposed to defend against these attacks in static sensor
     REPLICA NODE ATTACKS IN
                                           networks. These approaches rely on fixed sensor locations and hence do not work in mobile
     WIRELESS SENSOR NETWORKS
                                           sensor networks, where sensors are expected to move. In this work, propose a fast and
     USING SEQUENTIAL HYPOTHESIS           effective mobile replica node detection scheme using the Sequential Probability Ratio Test
     TESTING                               and some effective methods to defend against the node and link attacks . This is the first
                                           ABSTRACT
36                                         work to tackle the problem of replica node attacks in mobile sensor networks.
                                                                                        Privacy is an important issue in Ad hoc networks
                                                                                                                                                 Network Security         Sabina P H
                                           especially for Vehicular Ad Hoc Network . As the wireless communication channel is a shared
                                           medium, exchanging messages without any security protection over the air ,it can easily leak
                                           the information that users may want to keep private. Many schemes have been used to
                                           preserve the location privacy and for authentication. Here a new distributed key
                                           management framework based on group signature is used to provision privacy in ad hoc
                                           networks. Distributed key management is expected to facilitate the revocation of malicious
                                           nodes, maintenance of the system, and heterogeneous security policies, compared with the
                                           centralized key management assumed by the other group signature schemes. Here, each base
                                           station acts as the key distributor for the group. This security protocol is able to detect
                                           compromised base stations and their colluding nodes. Moreover, here it address the issue of
                                           large computation overhead due to the group signature implementation. A practical
                                           cooperative message authentication protocol is used here to alleviate the verification burden,
                                           where each node just needs to verify a small amount of messages. This protocol has smaller
     SECURED KEY MANAGEMENT
                                           packet loss ratio, less computation and communication
     WITH COOPERATIVE MESSAGE              overhead, as well as better security performance. Hence, it is more efficient and practical in
     AUTHENTICATION IN AD HOC              the real application.
37   NETWORKS                                                                                                                                    Network Security         Elizabeth Rose Lalson


                                           This paper presents the recent progress on advanced radio-over-fiber (ROF) technologies for in-
                                           building optical–wireless access networks, including multiservice, full duplex, and polarization
                                           diversity ROF system design, as well as the experimental delivery of uncompressed high-
                                           definition television (HDTV) signals. The novel polarization diversity technique is proposed to
                                           improve receiving sensitivity and increase the anti-interference capacity of the wireless
                                           transmission at the in-building environment. Furthermore, the integration architecture of ROF
                                           and Ethernet passive optical network (EPON) is investigated, mainly focusing on polar duplex
                                           antenna for non-line-of-sight (NLOS) Transmission and home gateway for different network
                                           topologies. The hybrid system distributes the multimedia services (e.g., HDTV in EPON) and
                                           other wireless data services to the terminal rooms over ROF links and thus expands the super
                                           broadband EPON services to the subscribers for the last meters in both wired and wireless
                                           ways.

                                           Index Terms: free space optic (FSO), Optical–wireless, in-building network, radio-over-fiber
                                           (ROF), Ethernet passive optical network (EPON), home gateway.
     Free space optic networking                                                                                                                                          s.ethiraj1 ,
38   system                                                                                                                                      Optical Communication    m.baskaran2

                                           Most of this data is multiattribute (multidimensional) and temporal in nature. We propose a
                                           new data analysis and
                                           isualization technique for representing trends in multiattribute temporal data using a
                                           clustering based approach. We introduce
                                           Cluster-based Temporal Representation of Event Data (C-TREND), a system that
                                           implements the temporal cluster graph
                                           onstruct, which maps multiattribute temporal data to a two-dimensional directed graph that
                                           identifies trends in dominant data
     C-TREND: Visualizing Trends in
                                           ypes over time.
     Multiattribute                        Key Words - Clustering, knowledge visualization, data mining, temporal data mining, trend
     Transactional Data                    analysis.
39                                                                                                                                               Data Mining              Srinivasa Rao Alapati

                                           Agile methodologies are gaining popularity quickly, receiving increasing support from the
                                           software development community. Current requirements engineering practices have
                                           addressed traceability approaches for well defined phase-driven development models. This
                                           topic discusses how agile processes resolve a paradox of requirements engineering – the need
                                                                                                                                                                          Jyostna        Devi
                                           to formulate a clear vision of a system in a world of constantly changing requirements and it
                                           provides an alternative to current theory based on experiences by agile process practitioners.                                 Bodapati,
     Traceability in agile process to      The topic also describes 1. Traditional process models, 2. Incremental development models, 3.                                  Veeranjaneyulu
40   improve Software quality              Agile process models, and 4. Introducing traceability into agile methods.                             Data Mining              Naralasetti

                                           A linear feedback shift register (LFSR) is proposed which targets to reduce the power
                                           consumption. It reduces the power consumption during testing of a Circuit Under Test (CUT) at
                                           two stages. At first stage, Control Logic (CL) consisting of ‘xor’ and ‘and’ gate is designed which
                                           makes the clocks of the switching units of the register inactive for a time period when output
                                           from the register is going to be same as the previous one and thus reduces unnecessary
                                           switching of the flip-flops. And at second stage,the LFSR reorders the test vectors by
     OPTIMIZATION OF POWER BY              interchanging the bit with its next and closest neighbouring bit.Clock gating technique has
     USING LINEAR FEEDBACK SHIFT           also been used.Here the LFSR is implemented in layout level and the circuit is tested for                                      Amrita Kumari,
41   REGISTER AS TPG                       reduction in power dissipation.                                                                       Embedded Systems         Mr. Anil Kr. Sahu




                                           The usage of online services has become an essential part of the busy human life. The internet
                                           age has increased the development and usage of web applications. People got accustomed
                                           using the web for routine work like payment of bills, taxes, money transfers etc., As valuable
                                           information is moved and stored in the back-end databases, the hackers and attackers are
                                           more interested in exploiting the security vulnerabilities of these applications.
                                           SQL Injection Attack is one such attack which is a major threat on the authentication,
                                           integrity and confidentiality of the databases used in the web applications. This attack stems
                                           from unchecked inputs which leads to the unauthorized access to the databases, leakage of
     A Novel Approach to Prevent and
                                           confidential information and sometimes corruption of the databases. To put a check on this,
     Detect SQL Injection Attacks in
                                           many researchers have proposed different prevention and detection approaches of this attack.
     Web Applications                      This paper is a study and evaluation of some of the static and dynamic analysis approaches for                                 N. Veeranjaneyulu,
                                           the prevention and detection of the SQL injection attacks.                                                                     M. Ramakrishna, B.
42                                                                                                                                               Network Security         Jyostna Devi

                                           Cloud Computing is rapidly emerging and the new development in Information Technology.
                                           There are many patterns, or categories, in the world of cloud computing that is needed for the
                                           enterprise architecture. Some of the categories of services are storage, database, information,
                                           process, application, platform, integration, security, privacy, management/governance,
                                           testing, and infrastructure. Scalability is one of the important features applied on any of the
                                           services. The existing analysis specially focuses on Architectural and policy Implications
         A Study on Scalability of         without exploring the data privacy issues. In this paper, the application scalability and data                                 R S M Lakshmi
     Services and Privacy Issues in        privacy initiatives on various services in cloud environments are presented, with an overview                                  Patibandla,
43   Cloud Computing                       of the trends they follow.                                                                            Cloud Computing          SanthiSri Kurra
                                           TCP connection is a connection oriented, reliable service. It uses 3 way handshake process to
                                           establish the connection. Distributed Denial of Service (DDoS) has emerged as one of the
                                           major threats to network security as evident from a series of attacks that shutdown some of
                                           the most popular websites. This attack prevents legitimate users from accessing the regular
                                           internet services by exhausting the victim’s resources, and TCP SYN flooding attack is the most
                                           common type of DDoS attack. TCP SYN flooding exploits the TCP’s 3-way handshake
                                           mechanism and its limitation in maintaining half open connection. The SYN flooding attack is
                                           very hard to detect, because it is difficult to distinguish between legitimate SYN packets and
                                           attack SYN packets at the victim’s server. This paper concentrates on the different IP spoofing
                                           techniques like Random spoofed source address, Subnet spoofed source address, Fixed spoofed
                                           source address and the schemes to detect the DDoS attack. The different schemes are SYN-
                                           dog, SYN-cache, SYN-cookies. These schemes are effective only up to a particular extent. This
                                           paper concentrates more on a newly proposed scheme which is a router based scheme that
                                           uses Counting Bloom Filter algorithm and CUSUM algorithm. The new scheme is highly                                             Anuraj K A
     EFFECTIVE APPROACHES TO               sensitive and always require a shorter time for the detection of both low intensity and high                                   Jogil Jose
44   DETECT DDoS ATTACK                    intensity attacks                                                                                     Network Security         Manoj R

                                           Face Recognition is used as a secure authentication technology for providing user
                                           authentication
                                           based on Face Recognition Algorithms .Face Recognition" generally involves two stages: Face
                                           Detection, and Face Recognition . Face recognition is implemented using face recognition
                                           algorithms. Recognition algorithms can be divided into two main approaches, geometric,
     SECURE AUTHENTICATION                 which look at distinguishing features, or photometric, which is a statistical approach that
     TECHNOLOGY FOR EFFICIENT              distills an image into values and comparing the values with templates to eliminate variances.
                                           In order to make an efficient technology for face recognition proposed system uses Gabor
     FACE RECOGNITION USING                phase patterns (Histogram of Gabor Phase Patterns (HGPP)). Face representation based on
     GABOR PHASE PATTERNS.                 Gabor wavelet is made use of ,also incorporates local patterns of Gabor such as local Gabor
     (Histogram of Gabor Phase             binary patterns (LGBP)
45   Patterns (HGPP))                                                                                                                            Image Processing         NEETHU RANJIT

                                           This paper discusses the fifth generation of the mobile communication technology. The
                                           evolution of this generation is focused on the integration of the existing network technologies,
                                           contrary to its predecessors which were having their focus on the evaluation as well as the
                                           expansion of the technologies. 5G is a step towards revolutionizing the concept of the
                                           handheld devices by bringing them in par with the computers and also turning them global.
                                           The ubiquitous nature of the mobile device is supported because of the deployment of wireless
     An Overview Of The Fifth              WANs in the 5G networks. Other than being faster and reliable these networks support
     Generation (5G) Of The Mobile         complex architectural frameworks discussed in this paper along with the extent of the
46   Communication Technology              economic feasibility of these networks.                                                               Mobile Communication     Ms.Harmandar

                                           ABSTRACT
                                           In this paper, a new design for a low power CMOS flash Analog-to-Digital Converter (ADC)
                                           that is more efficient in terms of power consumption and speed when compared to existing
                                           designs is proposed. A 6-bit flash ADC, with a maximum acquisition speed of 1 GHz, is
                                           implemented in a 1.2 V analog supply voltage. The traditional flash architecture offers a high
                                           sampling frequency and a high conversion speed because of its fully parallel architecture.
                                           However this kind of architecture consumes much power and the complexity of the design
                                           increases proportionally with the resolution. On the other hand, successive approximation
                                           architectures, which have a logarithmic dependence on resolution, reduce the complexity and
                                           the power consumption of flash ADC, but are not desirable for use in high speed applications
                                           since they consume multiple clock cycles to implement the conversion algorithm. The main                                       Anitha k
                                           concern of this project is to reduce the power consumption for flash ADC to be suitable for
                                           usage in low voltage applications. The new design offers lower number of comparators and
                                                                                                                                                                          Mohan,Akhilesh
     A1.2v High speed 6 bit 1GS/s          lower power consumption compared with the traditional flash ADC.This architecture can also                                     Praveen, Anugragh
     Flash ADC in 90nm CMOS                be extended to high resolution applications because of the simplicity of the design.                                           Thomas John,Jazil
47   Technology                                                                                                                                  VLSI                     Nazeer
                                           In this paper speech enhancement of corrupted speech signal is done by using kalman
                                           filter .Here first kalman filter is studied and then its performance is compared with the winer
                                           filter approach.speech enhancement is done by using kalman filter algorithm, and 10 db noise
     SPEECH QUALITY ENHANCEMENT suppressionWith a high total audiable quality obtained .                                                                                  Vaibhav Nema
48   USING KALMAN FILTER                                                                                                                         Signal Processing        Dr. R.K. Bhaghel


                                           Skin color has proven to be a useful and robust cue for face segmentation, detection and
                                           tracking. Image content filtering, content aware video compression and image color balancing
                                           applications can also benefit from automatic detection of skin in images. Numerous techniques
                                           for skin color modelling and recognition have been proposed during several past years. Face
                                           segmentation refers to the process of partitioning a digital image into multiple segments (sets
                                           of pixels, also known as super-pixels), which will represent them as identifiable face region.
                                           More precisely, face segmentation is the process of assigning a label to every pixel in an
                                           image such that pixels with the same label share certain visual characteristics.
     Skin Pixel Classification for Human   Keywords: Face Segmentation, Color Space, Skin Pixel Classification, Image Processing.                                         Madhav C1, Myna A
49   Face Segmentation: A Survey                                                                                                                 Image Processing         N2
                                           A remote compact sensor system for the detection of human vital signs (heartbeat and
                                           respiration rate) is presented. It consists of four sensors which are used to monitor the health
     Real Time Monitoring of Human
                                           of the patient and the surrounding environment. HSM20, LM35 LM358 and MAR953-00 are
     Heartbeat, Temperature,
                                           the sensors which are used to detect the patient and his surrounding conditions. GPS and GSM
     Respiration Rate and Humidity         system are used to know the condition of the patient and to track down the position of the
     Using GSM and GPS tracking            patient. With this system in case of emergency the doctor can monitor the patient health                                       Bhavya.M, B.Vijay
50   system.                               condition from different location.                                                                    Bio Medical              Kumar

                                           The logic storage of GIS (geographic information system) spatial data forms an efficient
                                           logistics distribution management information platform. This paper integrates GIS/GPS
                                           technology with logistics platform. Logistics is the management of business operations, such
                                           as the acquisition, storage, transportation and delivery of goods along the supply chain. The
                                           functionality includes navigation tracking, vehicle tracking, and alarm from logistics platform,
                                           tracking of moving entities, maintenance of remote map data and troubleshooting of map
     RATIONAL INTEGRATION OF               server. Map server holds all information related to the GPS tracking. This system will
     GIS/GPS IN A LOGISTICS                strengthen the logistics supervision and modernization, increase the transparency of
51   PLATFORM                              administrative business and enhance the rapid response capability.                                    Data Mining              Chinchu Krishna.S

                                           Online credit card fraud is becoming more and more sophisticated and increasing every year
                                           due to the extensive growth of online transactions. Several data mining based fraud detection
                                           techniques are developed and applied in various business fields. Data mining techniques
                                           automatically prepare user’s spending profile to differentiate fraudulent and legal
                                           transactions. This survey paper discusses various fraud categories and provides a special
     Data Mining Techniques in Online      emphasis on analyzing and comparing pros and cons of different category data mining based
     Financial Fraud Detection: a          credit card fraud detection techniques published by the researchers in the past few years on                                   Sherly K.K1, Dr. R
52   Survey                                the basis of speed, accuracy, efficiency and computational complexity.                                Data Mining              Nedunchezhian2


                                           In the current internet community, secure data transfer is limited due to its attack made on
                                           data communication. So more robust methods are chosen so that they ensure secured data
                                           transfer. One of the solutions which came to the rescue is the audio Steganography. But
                                           existing audio steganographic systems have poor interface, very low level implementation,
     EFFICIENT METHOD OF AUDIO             difficult to understand and valid only for certain audio formats with restricted message size.
                                           Enhanced Audio Steganography (EAS) is one proposed system which is based on audio
     STEGANOGRAPHY BY
                                           Steganography and cryptography, ensures secure data transfer between the source and
     MODIFIED LSB ALGORITHM AND            destination. EAS uses most powerful encryption algorithm in the first level of security, which
     STRONG ENCRYPTION KEY WITH            is very complex to break. In the second level it uses a more powerful modified LSB (Least
     ENHANCED SECURITY                     Significant Bit) Algorithm to encode the message into audio. It performs bit level manipulation
53                                         to encode the message
                                           DNA cryptography is a new promising direction
                                                                                                                                                 Network Security         Manju C.N.,
                                           in cryptography research that emerged with the progress
                                           in DNA computing field. DNA can be used not only to
                                           store and transmit information, but also to perform
                                           computations. The massive parallelism and extraordinary
                                           information density inherent in this molecule are exploited
                                           for cryptographic purposes, and several DNA based
                                           algorithms are proposed for encryption, authentification
                                           and so on. In this paper, a symmetric key bloc cipher algorithm is proposed. It includes a step
                                           that simulates ideas from the processes of transcription (transfer from DNA to mRNA) and
                                           translation. This algorithm
                                           is, we believe, efficient in computation and very secure,
                                           since it was designed following recommendations of
                                           experts in cryptography and focuses on the application of
                                           the fundamental principles of Shannon: Confusion and
                                           diffusion. Tests were conducted and the results are very
     Principles of central dogma of        satisfactory. Further, we are merging the concept of cryptography using colors and DNA
     molecular biology in 2-level          cryptography-hence, it is a type of 2-level cryptography which ensures strong security.                                        Panchami.V
54   cryptography                                                                                                                                Network Security         Fasila.K.A



                                           In this paper, we will see the categories of 'Man-in-the-Middle' attacks which aims Web
                                           Applications, The methods to steal users' private data when the victim uses a public network
                                           and some remediation actions to safeguard from attacks. If an attacker views or modifies
                                           sensitive data from the router in an untrusted network by deploying a Man–in-the-Middle
                                           attack is called as passive attack. Active attack is the term we will use to describe the new
                                           category of attack enables an attacker to harm even a cautious user who avoids the risk of
                                           Passive attacks by surfing only insensitive sites such as entertainment sites. The rules for
                                           using public wireless networks will protect against Passive attacks. But these are not enough
                                           to protect against active attacks. Browsing the Internet using a public network cannot be
                                           considered safe no matter which sites we visit or what information you submit. Dealing with
                                           the issue of Active attacks is not a question of fixing specific bugs since, as we will show, the
                                           issue is the result of a fundamental design flaw. There are some practical steps that can limit
                                           their impact. To prevent the MITM attack, proposing a Bi-Directional authentication scheme
     MITM Active and Passive attacks       on each transaction. We adopt the concept of One Time Passwords (OTP) for the purpose of
55   and Remediations                      authentication.                                                                                       Network Security         Basil George



                                           Nowadays, the major challenge faced by the electronic design teams is the increasing level of
                                           abstraction in the design of electronic complex systems. This is greatly related to the
                                           development of virtual models of components and devices based on four main objectives. They
                                           are: (1) early software development (2) architectural exploration (3) High Level Synthesis (4)
                                           Verification through different abstraction levels. This resulted in adopting new methodologies
                                           and electronic design automation (EDA) tools. This paper analyses the role played by System C
                                           and Transaction Level Modelling (TLM) in this change in methodology. An up-to-date list of
                                           EDA tools for High Level Synthesis (HLS) is also presented in this paper. Some of the listed HLS
                                           tools are analyzed searching for the innovations present in the latest versions. Finally,
                                           conclusions are presented as summary and future works are commented on. In this second
                                           decade of 21st century, the electronic design teams are giving due concern to “design
                                           productivity gap”. This expression explains that the no. of available transistors is growing fast
                                           than the ability to meaningfully design them. This poses a great risk of breaking the long
                                           standing trend of progress in the semiconductor industry which is because of the failure to
                                           effectively develop and deploy the necessary innovations in the electronic design technology.
                                           The current trend of capability of technology with respect to the productivity of hardware and
                                           software design is discussed graphically. Anyways; traditional hardware design methods and
                                           debugging are time consuming for today’s complex digital applications. This paper also                                         Aathira AjitKumar,
     Review of Electronic Design tools     discusses strategies to face new challenges, accurate estimations, system C and Transaction                                    Kalyani S. Varma,
56   for High Level Synthesis              Level Modelling in detail.                                                                            Sensor Networks          Manjulakshmi V



                                           A wide range of emerging and promising wireless communication protocols are rapidly being
                                           introduced into vehicles. They are commonly used for in-car infotainment, telematics, and
                                           safety applications. However, adopting new wireless communications into vehicles requires
                                           them to be equipped with the corresponding hardware devices. This hardware dependency
                                           incurs extra costs to customers to deploy and maintain wireless services in vehicles. To
                                           alleviate this problem, a novel wireless communication gateway for vehicles is proposed that
                                           is called the Software-Defined Radio (SDR)-based Wireless Communication Gateway (SWICOM).
                                           It exploits the SDR technology that uses software running on a generic hardware platform to
     SWICOM: An SDR-Based Wireless         perform signal processing instead of dedicated hardware. The SWICOM can thus integrate
     Communication Gateway for             multiple wireless hardware devices into a single generic wireless gateway device, which
57   Vehicles                              improves flexibility, adaptability, and connectivity of wireless communications                       Wireless Communication   Amrutha .V. A

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:19
posted:10/13/2011
language:English
pages:2