Sie sind auf Seite 1von 50

ICEMC 2 2007:

Second International Conference on Embedded Systems, Mobile Communication and Computing

August 3-5, 2007

PESIT, Bangalore India

Web: http://www.pes.edu/mcnc/icemc2/

Organized by Mobile Communication and Networking Center of Excellence (MCNC)

2nd August 2007, Thursday:

Tutorials, Workshops

Day 1: 3rd August 2007, Friday

Advance Program:

8AM-

 

9:30AM

Registration

9:30AM-

 

10AM

Conference Inauguration, Opening Remarks

10AM-

 

10:45AM

Opening Key Note Lecture

10:45AM-

 

11AM

Tea Break

11AM-

 

12PM

Key Note Speech 1:

12PM-

 

1PM

Key Note Speech 2:

1PM-2PM

Lunch

   

Paper Session 1B:

2PM-

3:30PM

Paper Session 1A :

Ad-hoc Networks:

15, 21, 63, 64,114, 115, 145

Cellular Systems, Handover and Applications 4, 34, 39, 77, 113, 125

3:30PM-

 

4PM

Tea Break

   

Paper Session 2B:

4PM-

5:30PM

Paper Session 2A:

Embedded Systems 13, 38, 89, 143, 166

Fuzzy Logic, Grid Computing and Location Based Services 3, 55, 59, 70, 137, 180

Day 2: 4 th August 2007, Saturday

8AM-

 

9:30AM

Registration

9:30AM-

Key Note Speech 3:

10:30AM

10:30AM-

 

11AM

Tea Break

   

Paper Session 3B:

Cryptography and Network Security 5, 51, 62, 66, 74, 79

11AM-

Paper Session 3A:

1PM

Multimedia and DSP:

12, 16, 19, 49, 58, 69

1PM-2PM

Lunch

   

Paper Session 4B:

2PM-

3:30PM

Paper Session 4A:

Multimedia and DSP:

76, 102, 135, 136, 154

Cryptography and Network Security 120, 96, 117, 146, 150

3:30PM-

 

4PM

Tea Break

4PM-

 

5:30PM

Panel Discussion

5:30PM-

 

6PM

Snack Break

6PM-7PM

Banquet Speech:

7PM-9PM

Cultural Program, Prize Distribution, Dinner

Day 3: 5 th August 2007, Sunday

8AM-

 

9:30AM

Registration

9:30AM-

Key Note Speech 4

10:30AM

10:30AM-

 

11AM

Tea Break

 

Paper Session 5A:

Paper Session 5B:

11AM-

Phy, Modulation, OFDM and Sensor Networks 104, 161, 168, 133, 170

WLAN, Bluetooth and Network Performance 11, 27, 29, 61, 67, 95, 124, 134

1PM

1PM-2PM

Lunch

 

Paper Session 6A:

Paper Session 6B:

2PM-

Poster 20, 22, 25, 30, 31, 33, 36, 37, 46, 68, 72, 85, 90

Poster 91, 92, 101, 108, 110, 118, 122, 140, 141, 152, 159, 175

3:30PM

3:30PM-

 

4PM

Tea Break

4PM-

 

5:30PM

Conclusion

ICEMC 2 2007 Key Note Lectures and Industry Presentations

No.

Speaker

Title

Opening

Mr Sam Pitroda, Chairman, Knowledge Commission, India

Title to be confirmed

Mr. Sam Pitroda is an internationally respected development thinker, telecom inventor and entrepreneur who has spent 40 years in Information and Communications Technology and related human and national developments. His experiences include working in the private and public sectors and working with governments around the world. A reputation built from many years of work, Sam Pitroda brings enormous professional weight and credibility to his projects and operations.

Credited with having laid the foundation for and ushered India’s technology and telecommunications revolution in the 1980s, Mr. Pitroda has been a leading campaigner to help bridge the digital divide. During his tenure as Advisor to Prime Minister Rajiv Gandhi in the 1980s Mr. Pitroda headed six technology missions related to telecommunications, water, literacy, immunization, dairy and oil seeds. And, he was also the founder and first chairman of India’s Telecom Commission.

Currently, Mr. Pitroda is chairman of India’s National Knowledge Commission which reports directly to the Prime Minister. The commission’s mandate is to offer a series of recommendations to the government on access, concepts, creation, application and services related to knowledge to help build excellence in the education system to meet the challenges of the 21st century and increase India's competitive advantage.

He owns close to 100 patents. He is widely regarded as one of the earliest pioneers of handheld computing because of his invention of the Electronic Diary in 1975. He was also among the pioneers in digital telephone switching technology in the late 1970s and early 1980s. The decade of 1990 saw Mr. Pitroda explore the world of mobile phone based transaction technology and telecom developments in emerging markets.

Mr. Pitroda is also founder of the US based company, C-SAM, Inc. C-SAM provides a robust software platform for conducting secure payment and non-payment transactions in the physical and virtual world using a mobile device. C-SAM is committed to the vision of a digital wallet which is tightly integrated with value added services and applications and resides on a consumer’s mobile device.

Key Highlights:

 

Chairman of India’s Knowledge Commission Founder of C-SAM, Inc. Founding Chairman of Telecom Commission - Government of India Founder of several companies in the United States and Europe, including Wescom which was one of the first digital switching companies in the world Owner of close to 100 worldwide patents, including the digital diary which was used by companies such as Casio, Sharp and Texas Instruments etc. Credited with having laid the foundation for and ushered in India's technology revolution in the 1980s as Technology Advisor to the Prime minister of India Invited by the United Nations Secretary General to join a special committee to advise on global digital divide issues.

1

 

Creativity and

Innovation:

Dr. Nalin Sharda, Victoria University, Australia

The Key to ICT Advancement and Social Wellbeing

Summary Creativity and Innovation are the keys to continued advancement of human societies and their wellbeing. Information and Communication Technologies (ICT) have assumed a key role in the advancement of all societies today. Engendering the spirit of creativity and innovation is more important than ever before as internationalization of industry and education takes hold; however, social structures, and educational paradigms used in most countries work against the spirit of innovation. Chris Stevens defines creativity as “the ability to generate and use insight”. To some extent everyone is capable of being creative; however, most people do not exploit their full creative potential, as they do not have a clear process to guide and

sustain the flow of their ‘creative juices’. Joyce Wycoff says that innovation is a “mental extreme sport”; therefore, like all good sports persons, innovators need to train their body, mind and spirit to do it well. Wycoff adds that innovation requires “pulling unrelated things together”; thus, to innovate, one must have

a

wide range of interests, as a corollary narrow focused programs and courses hinder innovation. In this

seminar we will investigate how creativity and innovation can be embedded in as an educational paradigm, and in particular for Information Technology education.

Presenter Prof. Nalin Sharda gained B.Tech. and Ph.D. degrees from the Indian Institute of Technology, Delhi. Presently he teaches and leads research in Multimedia and Internet Communications at the School of Computer Science and Mathematics, Victoria University, Australia. Dr. Sharda publications include the Multimedia Information Networking textbook, and around 100 papers and handbook chapters. Nalin has invented Movement Oriented Design (MOD) paradigm for the creation of effective multimedia content based experience, and applied it to e-Learning and other applications. Nalin is leading projects for the Australian Sustainable Tourism CRC, to develop e-Tourism using Semantic Web technologies, and innovative visualisation methodologies. Nalin has been invited to present lectures and seminars in the Distinguished Lecturer series of the European Union’s Prolearn program. He has presented over fifty seminars, lectures, and Key Note addresses in Austria, Australia, Finland, Germany, Hong Kong, India, Malaysia, Pakistan, Japan, Singapore, Sweden, Switzerland, UAE, and USA.

For further details visit http://sci.vu.edu.au/~nalin/

 

2

Mr. Santosh V Patil, Symbian Software India Private Limited, Bangalore

Symbian OS: The Platform Security Model

Santosh.V.Patil@Symbian.com

Details:

 

1.

Smartphones - Mobile communication & computing devices

 

- Introduce smart phones (Mobile phone + PDA)

- Rise in computing power, storage and capabilities (WiFi, GPS, Mobile TV)

- Being projected as multimedia computing devices

 

2. Potential Security Threats

- Theft of personal info (contacts, messages, photos, video, wallets, etc)

- Identity hijacks (through theft of personal info)

 

- Runaway billing (unauthorized calls, SMS)

3.

Symbian OS with Platform Security

- Introduction to Symbian OS

- Platform Security (overall initiative)

- Mitigation of threats

4. The Trusted Computing Model

5. Capabilities & Data Caging

6. Symbian Signed

7. Q & A

 

3

Mr A Balaji, Midas Communications, Chennai, India

Innovations in Affordable Wireless Broadband Access

Technology evolution in Wireless Access Networks and demand for Broadband Internet Services is moving forward rapidly. With increased competition among operators to attract subscribers, there is an increased need to choose a technology that differentiates him from others, in terms of contemporary services it offers to subscribers and the cost at which it is offered. In Wireless Access Networks, with the increased demand for spectrum, a technology which is spectrally efficient and can pack more bits/Hz is the key. On the other end, it should also be able to provide toll- quality voice, and all types of Internet services ranging from Voice over IP, Video on Demand, Multicast services like - Video conferencing, Internet Radio, and so on. Another major challenge in today’s scenario with the wireless access technology is the rate of obsoleteness – the time period after which the technology needs upgradation to support new services. Midas Communication Technologies building on its expertise of 15 years continues to innovate in affordable wireless technology solutions. corDECT (a DECT based Wireless Local Loop technology, providing Toll-Quality Voice and simultaneously 35/70 kbps Internet service) and Broadband corDECT (providing simultaneous Toll-Quality Voice and 256/512kbps Internet Service) are the result of these innovations. Broadband corDECT was developed by providing proprietary extensions to the standard ETSI DECT Protocol Stack (ETS 300-175 series) at Physical, MAC and DLC layers to provide a capacity of 2.88 Mbps (Uplink+Downlink) per carrier per sector, with a spectrum utilization of 1.66 bits/sec/Hz. It incorporates adaptive multi-level GFSK modulation (2/4/8 level modulation, which can carry 1/2/3 bits per symbol), Hybrid ARQ and Packet scheduling based on Channel Quality and link budget. This system also provides polarization diversity with selection between Horizontal and Vertical Polarization, adding to the time and frequency dimension. Fast Channel setup at the MAC layer (of the order of 20ms) ensures that the system can operate in Always ON mode where the network connections are retained logically while physical connections are suspended when there is no traffic. Further, MAC bearers can be increased or decreased to carry application payload. Broadband corDECT supports contemporary internet services such as Voice Over IP, Video On Demand, Multicast services, etc. System implements VLAN (802.1q, 802.1p), Multicast, Routed and Bridged mode of operation supporting PPPoE/DHCP mode of access, Security features such as ARP spoofing, Broadcast/Multicast Strom Control, Access Control List (ACL). To improve throughput system implements IP header compression and payload compression. Broadband corDECT architecture implements advanced end-to-end QoS (Quality of Service), for delivery of

delay and jitter sensitive applications. Apart from the regular policing and scheduling of traffic based on the class, the class is also mapped to the physical level service flows. The physical level QoS includes ARQ with various timeout to suit a particular application, and wireless traffic scheduling. These advanced QoS features provide real-time, non-real time, high reliable channels for delivery traffic from various Internet applications. Broadband corDECT architecture is Internet Centric and also is future proof such that when air-interface bandwidth increases, the traffic can still be carried through by the same infrastructure, thus enhancing the Return On Investment (ROI) for the operator and reducing the Rate of Obsoleteness. In the process of continuous innovation, next in Product line Broadband corDECT NG supporting data rates of 1 Mbps per subscriber uses reconfigurable RFIC and baseband platform allowing full compatibility with DECT to IMT 2000 evolution and beyond. Innovation in MAC architecture will allow intelligent multiplexing on a per session basis between ARQ and FEC schemes on the fly, purely based on SNR and CIR [Midas/IIT IPR].

Bio

A. Balaji received his B.E. degree in Computer Science and Engineering from Madurai Kamaraj University, India in 1993. He received his M.S. degree in Computer Science from the Indian Institute of Technology, Madras, India in 1999. He was employed by Future Software Pvt Ltd., Chennai, India during 1993-94. While at IIT Madras he was working as Senior Project Officer for the corDECT project. Since 1998, he has been with the Midas Communication Technologies Pvt. Ltd, Chennai, India as Manager. He is currently working for the Broadband corDECT project.

4

Mr Rakesh Radhakrishnan, Sun Microsystems, USA.

Identity and Security for NGN

Rakesh.Radhakrishnan@Sun.COM

Abstract:

In this Keynote Rakesh will present the concepts behind how an Identity Centric Architecture acts as the Secure Policy Control Stratum –Aligning Service Oriented Architecture (Service Signaling Stratum) with the Next Generation Network (Packet Handling Stratum). This will be based on his book that covers the strategic significance and synergy of Identity based Security for 4G Networks, Sensor Networks, Programmable Network, IMS Network and Service/Content Delivery Networks

Bio:

Rakesh Radhakrishnan is a Lead IT Architect in the Communications Market Area of Sun Client Solutions. He has covered Telecom Companies, Network Equipment Providers (NEP), Independent Software Vendors (ISV) and Service Provider accounts in Europe, Canada, USA and Latin America. He has over 15 years of experience and has an MBA (MIS) and MS (MIT). He is an active member of Customer Engineering Council (CEC) and was the Chairman of a Working Group on Container Alignment Engine (CAE patent received from Europe and US) at Sun. He also has pending patents on Correlated Identity. He has published more than 50 papers on IT Architectures (Frameworks, Process and Techniques) and is a frequent speaker in conferences including DIDW, OMG, TOG, CMG, IRM, SuperG, SunNetwork, Java ONE, etc. He has led multiple Architecture Workshops and Architecture Assessments for IT Consolidation and Network Identity projects. He was recently featured on Officer Outlook for his work on Aligning Architectural Approaches (Sun's WS-Incite Award for 2005). Rakesh is also the author of the upcoming book on "Identity and Security". Rakesh is also Certified by TOG (on TOGAF 8), SEI (as a SW Architect) and OGC (Prince 2 and ITIL). He has Green Belt Six Sigma training. He is a ECCSE (Enterprise Computing Certified Systems Engineer –Competency 2000- from Sun ) and as a Systems Architect Pro

(from Peoplesoft). His blog can be found at http://identity-centric-architecture.blogspot.com/

 

5

Dr. Narendranath Udupa, Philips Software, Bangalore, India

Creating

an

Innovative

Environment

Abstract:

 

Some organizations are able to generate successful product and process innovations over and over again. An important part of their success, of couse, stems from the superior management processes and organizational structures they use to bring new ideas to market. This keynote covers the processes and structures followed in a typical organzation to create successful innovative environment. To begin with, Intellectual economy will be defined and the process of patent creation, and value extraction from patents will be shared. Salient features of a successful innovative organization will be presented. Story of a few historically bright ideas which failed to pay back the inventors due to timing reasons will be shared. Certain strategic methods used for generating innovative ideas will also be discussed. The attempt to reach out in the era of Open innovation will also be presented.

Bio:

Dr Udupa holds Ph.D and M.E. from IISc Bangalore and B.E. from MCE, Hassan, with over 20 years of rich work experience with 6 years in modeling and performance analysis of software intensive, resource constrained, systems including 15 years in modeling and control of real-time electrical systems in academic/research environment. He is currently Technology manager in Philips consumer electronics division, contributing to the development of inventions, idea creation, Plans and directs participation in competency development and academic interactions. He has served as the technical lead for the team in the application of advanced theories, concepts, principles & processes for an assigned area of responsibility (subject matter, function, type of facility/equipment/product). He planned and directed research projects with full technical responsibility for interpreting, organizing, executing, and coordinating assignments He coordinated research and development activities between disciplines involving exploration of subject area, definition of scope and selection of problems for investigation, and development of novel concepts and approaches. He monitored the capacity, plans, develops, coordinates, and directs a number of large and significant projects or a project of major scope and importance.

Significant Achievements;

 
 

More than 35 invention disclosures in the area of Media Applications, Memory hierarchy, SoC Performance, Scheduling and Image Security.

14 Patent Filings in the area of memory hierarchy, SoC Performance, Scheduling, and Image Security

Recipient of the Golden Leaf Award (highest award in Philips Innovation Campus, Bangalore) for outstanding contribution to IP development. Recipient of Star Performer Award for outstanding contribution to IP development

Written 8 Technical Reports in the area of SoC architecture Performance, Performance Visualizer, Generic Performance Measurement Collection Framework, Models for Performance Prediction.

6

Mr. Paul Jeong, L&T Infotech, Bangalore, India

Title Not Available

Abstract Not available

 

7

Mr. Ravinder Sabhikhi, IBM USA

NGN Revolution challenges and opportunities

CTO AP, NGN Distinguished Engineer sravi@us.ibm.com

Abstract

As the shift to all “IP” based networks takes place it brings some interesting set of challenges to Service providers and Network Equipment providers, The Telecom market is a dynamic market, currently driven by gaining consumer market share via attractive Services offerings. However just the introduction of services is no longer enough for differentiation in such a competitive market place. The value proposition is shifting from connectivity to the quality of experience and time-to revenue is becoming critical factors for differentiation. By leading these shifts, the internet vendors such as Google, Myspace.com, Skype, Yahoo, MSN etc. are taking bite out of the service providers revenue. These forces are driving major transformations in the Telecommunication industry which are rapidly changing the rules for competing. To differentiate, service providers really need to focus on strategic service areas with long term planning in place. The convergence of the telecom infrastructure toward a more open, IP-focused IT architecture is one likely scenario that will play out in the industry hence the need for deployment of applications such as IMS, IPTV, Rich Content, VoD, SDP etc. is much more essential at this point of time. The transition toward an IT-like structure where any application can run over many different types of network transport will revolutionize new service creation in the telco community.

Bios Ravinder Sabhikhi is a Distinguished Engineer at IBM. His current assignment is CTO for Next generation Networks for the Asia Pacific. He has over 25 years of experience in system architecture, design, developing and leading teams of engineers in the development of world class networking products. Ravinder holds several patents in the field of networking, he has received bachelors and masters in Computer Science and Masters in Business Management from NC State University USA.

Message from Dr. Suthikshn Kumar, General Chair ICEMC 2 2007

from Dr. Suthikshn Kumar, General Chair ICEMC 2 2007 Hi ALL I am glad to welcome

Hi ALL

I am glad to welcome you all to the ICEMC 2 2007, Second International Conference on Embedded Systems, Mobile Communication and Computing, being held at PESIT, Bangalore India from August 3-5, 2007. This conference attempts to bring together professionals, programmers, researchers, academics and students to discuss latest innovations and technology trends in the Embedded systems, Mobile Communication and Computing domain.

The First ICEMC 2 2006, which was successfully held last year, generated enormous amount of interest from Industry and academics. Based on the participants feedback and organizers experience, we have planned for organizing the ICEMC 2 2007. The World Congress on Lateral Computing ( WCLC) series of conferences is now merged with ICEMC 2 series of annual conferences. The reputation built over by successfully organizing ICEMC 2 and WCLC series of conferences has helped us attract expert speakers, high quality papers, co-sponsors, participation from leading MNCs and institutes.

The ICEMC 2 2007 consists of 7 key note lectures, 10 paper sessions, 2 poster sessions, 2 tutorials, a panel discussion, and a cultural program. The conference activities are spread over a period of 4 days. The conference is well planned and tracked. The programs and papers are reviewed by some of the leading experts in this domain.

Key Note lectures

:

We are glad that some of the leading experts are coming together to present key note lectures at ICEMC2 2007.

Sam Pitroda, Chairman, Knowledge Commission, India

Nalin Sharda, Victoria University, Australia

Ravinder Sabhiki, IBM USA

Rakesh Radhakrishnan, Sun Microsystems, USA

Narendranath Udupa, Philips Software, India

Santhosh Patil, Symbian Software, India

A Balaji, Midas Communications, India

Paper Sessions:

The following bar chart shows the analysis of papers selected at ICEMC2 2007. There were close to 200 papers submitted for review. Even after submission deadline has been closed, we kept receiving the papers. Based on the reviewers comments, we could accept 30% of the papers submitted for final presentation. The papers have been selected based on their relevance to the conference theme, quality of research results, sound technical content, writing style and language, innovativeness. We have also tried to ensure that papers cover diverse topics of interest to the participants.

International Conference on Embedded Systems, Mobile Communication and Computing, August 3-5, 2007, Bangalore India

ICEMC2 Paper Analysis Submitted Accepted 30 25 20 15 10 5 0 Topics Ad-hoc Networks
ICEMC2 Paper Analysis
Submitted
Accepted
30
25
20
15
10
5
0
Topics
Ad-hoc
Networks
Artificial
Intelligence
Mobile
Applications
Hando ver Systems
Cellular
Systems
and
Embedded
Fuzzy
Logic
Grid
Computing
Intelligent
Agents
Location
Based
Services
Multimedia
DSP
Network
Performance
and OFDM
Phy, and
Modulation
Roboti cs
Sensor
Networks
Sof tware
Engineering
& Bluetooth
WLAN
and Network
Cryptog
raphy
Security
Miscelleneous
Papers

The papers will be presented by authors from leading institutes and organizations from around the world. The paper sessions cover research progress in various topics as follows:

Ad-hoc networks: Simulation of routing protocols, routing strategies, data accessibility in Manets,

performance comparison, security protocols, QoS routing. Cellular System, Handover and Application: Temperature monitoring, economic RFID system, collision

warning system, context aware End-to-end connectivity management, soft handoff performance, adaptive data transmission, Embedded Systems: Data storage device design and development, development life cycle, data acquisition system, Multisensor autonomous robot, remote temperature monitoring.

Fuzzy Logic, Grid Computing, and Location based Services: Intelligent system for crop, power system stability using fuzzy logic, fuzzy diagnosis of esophagitis, Resource discovery using mobile agents in grid, GPS location based mobile emergency services, Mobile Yellow pages,

DSP/Multimedia: MCTF for scalable video coding, block based thinning algorithm, model based tracking, comparison of digital video, semantic characterization of visual media, classification of environmental sounds, Quality and performance of video network, signal processing for real time multichannel GPS software receiver, digital sound processor for auditory prostheses, motion estimation in video codec, generation of super resolution video, Cryptography and Network Security: User Authentication, vulnerability in TCP/IP, secure signature schemes, security risks in VOIP, virus in mobile phones, key management, Implementation of cryptography using network processors, novel authentication and key agreement protocol, digital signature using LSB hiding and RSA, Chaos based encryption scheme, Montgomerry multiplication algorithm.

Phy, Modulation, OFDM and Sensor Networks: Performance of MIMO systems, Rayleigh Fading effects,

Localization algorithms, Subspace algorithm for MIMO. WLAN, Bluetooth and Network Performance: Security of 802,11a and HiperLAN/2, Load balancing in MPLS, QoS in MAC for WLANS, Enhanced Scheduling mechanism for Bluetooth, enhanced congestion control mechanism using network processor, QoS protocols of RPR, analysis of delay-tolerant networks.

International Conference on Embedded Systems, Mobile Communication and Computing, August 3-5, 2007, Bangalore India

Proceedings: The conference proceedings is brought out as a CD with soft copies of papers, presentation slides, tutorial notes, key note lecture presentations etc. Also, a special issue of journal with selected papers presented at the ICEMC2 2007 is being brought out. The proceedings CD and journal serve as very useful research content for students, professionals, academics and researchers in this domain.

The ICEMC2 2007 is attracting participants from all over the world. Some of the leading institutes, organizations and MNCs from India, North America, Australia are participating. The conference was initiated soon after the first ICEMC2 2006. Soon the website was deployed by January 2007. The initial submission of papers was closed by 15 th April 2007. The conference attracted submission of approximately 200 research papers. The Conference Management Toolkit (CMT) was used for paper submission and reviews. After careful reviews, 65 high quality research papers were selected for the conference presentation. The conference program was reviewed at different stages. The ICEMC2 2007 is co-sponsored by PESIT, Wiley Publisher, Microsoft, Indian Space Research Organization, Philips, Global Edge, MCNC, Wiley and other organizations. We thank all the co-sponsors.

The conference committee comprises of some of the leading experts in Embedded systems, Mobile Communication and Computing. The committee is drawn from both academia and industry and represents almost all the aspects of the domains. PESIT with its beautiful campus and good infrastructure is well suited to hosting the ICEMC2 2006. It is centrally located and has 3 star hotel on campus, ample parking facilities, computer network, canteens etc. to facilitate successful conference organization. The conference benefitted from review comments provided by volunteer reviewers.

Acknowledgement: The conference organization received whole hearted encouragement and support from Prof K.N. Balasubramanya Murthy, Principal of PESIT. We would like to thank him for his efforts in shaping this conference and making it a big success. Prof Shylaja, of ISE dept need special mention as she took personal interests in supporting the conference activities. Then all the members of Mobile Communication and Networking Center of Excellence ( MCNC ) at ISE dept have significantly contributed in one way or the other. We thank Travel Corporation of India( TCI) for providing online registration for participants. We thank Mr Dakshina Murthy, PESIT for his advices and support through logo and brochure designs. We also thank M/S Lotus printers for ontime publication of CD and book proceedings and advance program booklets.

Dr. Suthikshn Kumar, General Chair, ICEMC2 2007, 3 th August 2007

International Conference on Embedded Systems, Mobile Communication and Computing, August 3-5, 2007, Bangalore India

Tutorials

Thursday, 2 nd August 2007 2Pm-3:30 PM

Tutorial

   

No

Title

Speakers

1

Effective Learning of Mobile Communication using Real World Analogies and Case Studies

Dr. Suthikshn Kumar PESIT, Bangalore

Abstract:

What’s fishing, cooking, gardening, eating, car repairing, butterflies, telescope, monkeys, frogs, etc got to do with teaching Engineering courses? In this tutorial, we build interesting analogies from real world to make the job of teaching very interesting. Analogies are a way of explaining something by comparing it to something else. This technique also uses partial similarity. For example, we may give an analogy of bird for explaining how airplane works. Case Studies are presented to students to improve their understanding of the subjects. In going through case studies, we learn from others experiences. We present some interesting analogies and case studies for specific subject of Mobile Communication. The tutorial is based on speaker’s experience in teaching Master’s and Bachelor’s students. The tutorial is supplemented by resource CD on Mobile computing.

Ref: CSI Communication, July 2007 issue, “Effective teaching of Mobile Computing using Real World analogies and Case Studies”.

Bio:

Dr. Suthikshn Kumar has 15+ years of experience in research and industry. He has worked in leading institutes and multinationals such as Philips Semiconductor, Infineon Technologies, L&T Infotech, University of Melbourne, IIT Chennai, Telstra Research Labs, Bangalore University. Prof Kumar has won several awards for innovation and quality. Dr Kumar has worked in countries such as Australia, France, Germany, Netherlands, UK and India. His pioneering contributions to computing field include "Lateral Computing", "Smart Volume control", "Fractal Ring Tone Generator". Dr Kumar has presented 23+ research papers in leading international conferences/conventions/journals. He has worked on several cutting edge projects on Mobile communication, VLSI design automation, Parallel Computing etc. Dr Kumar has served as general chair and technical program chair of several international conferences and workshops such as WCLC 2005, WCLC 2004, WoSCo, ICEMC2 2006 etc. Prof Kumar is also founder and CEO of Uvinix Computing Solutions, a hi-tech statup.

2

Programmable System On Chip (PSOC) for an Embedded System Design

Kashiraya Biradar* Dr. Vijaya P A* Mr. Anil K S** *Dept of E& C MCE, Hassan. **Cypress Semiconductors, Bangalore. uak@cypress.com

Abstract:

This tutorial aims at the usage of Programmable System On Chip (PSOC) in an Embedded System Design. PSOC Integrated Circuits (ICs) consists of many Mixed Signal Arrays with On Chip Controller devices. These devices are designed to replace multiple traditional Micro-Controller Unit (MCU) based system components by a low cost single- chip programmable component. A PSOC device includes configurable blocks of analog and digital logic as well as programmable interconnects. This architecture allows the user to create customized peripheral configurations to match the requirements of each individual application. Additionally, a fast Central Processing Unit (CPU), Flash program memory, SRAM data memory, and configurable Input/Output are included in a range of convenient pin out. We have carried out the experiments for the validation of Analog to Digital Converter (ADC), Digital to Analog Converter (DAC) and their characteristics. We have also interfaced Encore-II with another PSOC, where Encore-II itself is a PSOC. The register and memory contents of Encore-II were read / written with the help of a PC’s hyper terminal. The results were found to be satisfactory.

Panel Discussions

Saturday, 4th August 2007 4Pm-5:30 PM

 

Mobile Application Development: Trends, Prospects and Future

Brief :

Mobile devices are becoming more sophisticated and are growing to be part of everyday life. The exponential growth in wireless devices can be observed to impact our daily life. They are growing beyond the need of voice communication and finding new applications in messaging, web browsing, audio play back, video playback, image capturing, games etc. Application development for Wireless devices has become hot topic recently. The application developers benefit with newer mobile devices supporting such platforms as Java, BREW etc. J2ME, Nokia SDK, Windows Mobile, Flash Lite, WAP etc are providing the impetus to application developers in coming out with innovative applications and making the mobile devices rich with features. Mobile application developers face several challenges such as limited processing power, memory constraints, smaller display size and key pad, battery power limitations, lower bandwidth, higher delay and jitter etc. In this discussion, the focus is on platforms, environment and innovation in Wireless Application development for Mobile devices.

Panel Discussion topics:

 

Innovative applications for Wireless devices Development Platforms: J2ME, BREW, Flash Lite, WAP Optimization techniques, Code Obfuscation, Virtual Machines IDEs: Netbeans, Eclipse, Location based applications using technologies such as Google Map API, GPS New Feature phones such iPhone

Some important questions for panel members and Audience:

 

Which are the killer applications for Mobile devices? What strategies should the Mobile Application developer community adapt? Which platforms are good for mobile game development? What will happen to Mobile Applications when 3G is deployed? What is the impact of WiMAX on Mobile applications? Should there be courses to impart Mobile application development skills? What is happening to technologies such as WAP? How are the device manufacturers supporting the Mobile applications? Which are the good competitions suited for Mobile Application developers? What are the business Models? How to test the applications and get certified? What are the security issues, IP issues, virus issues etc tackled?

Session 1A: Ad-hoc Networks

Friday 3 rd August 2007

2-3:30PM

Paper

   

No

Title

Author

 

Simulation of DSDV, AODV and DSR Routing Protocols In Ad-hoc Network

Shyam Lal*, NIT,Kurukshetra- india,

15

shyam_rao24@rediffmail.com

This paper presents the simulation of DSDV, AODV and DSR routing protocol in ad-hoc network using NS- 2 simulation. An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration A simulation model with MAC and physical layer models is used to study interlayer interactions and their performance implications. The On-demand protocols, AODV and DSR perform better than the table-driven DSDV protocol. Although DSR and AODV share similar on-demand behavior, the differences in the protocol mechanics can lead to significant performance differentials. The performance differentials are analyzed using varying network load, mobility, and network size.

21

Highly Dynamic Multivalued Unified Vector Routing For Ad-Hoc networks

Naga Raju*, Kits, nagaraju_aitha@yahoo.com

Abstract Mobile Ad-Hoc networks are combination of wireless nodes which dynamically exchange data - among themselves with out any centralized access point. In this paper we describe an idea of constructing multi path [1] routing from source to destination node in Mobile Ad-Hoc networks with the help of qualitative metric We have made changes to Highly Dynamic Distance vector routing vector algorithm [2] to also satisfy the requirements of mobile ad-hoc networks. In DSDV every node periodically broadcast current associated statistics to its neighbor nodes. We transform the attributes values of the statistics in to unified ranks [3], the average of unified rank is treated as a qualitative fitness value of the link. Routing decision process has been enhanced by embedding this proposed qualitative fitness metric for selection of multiple paths in DSDV for efficiency (increase the reliability of data transmission or to provide load balancing). Index terms: Multipath, unified rank, qualitative fitness.

63

Routing Strategies in MANETs

Sujatha B R*, Malnad college of Engineerng; Shiva Prakash, Bahubali College Engineering; Sathyanarayana M V, Malnad College of Engineering brs_hsn@rediffmail.com; shivu_kssp@rediffmail.com; mvsmagge@gmail.com

Abstract: Adhoc networks are self-organisable mobile networks with data transfer occurring in a dynamically varying environment. This poses lots of challenges in terms of low data rates, varying faded signals arriving at the receiver, varying topology, severe power constraints etc. Routing is the most

important aspect considering all the above constraints. In this paper an attempt has been made to look for routing protocols, which provides sufficient QoS using limited overheads during transmission, consuming limited power. Simulation results will indicate the variations in throughput, delay etc for different network scenarios. Index Terms: Mobile Adhoc Networks (MANETs), Proactive routing, Reactive Routing, Hybrid Routing, Core Extracted Distributed Adhoc Routing (CEDAR), Rushing Attack Prevention protocol (RAP), Energy Aware DSR (EADSR).

64

Improved Data Accessibility in MANETS

Shiva Prakasha*, Bahubali College of Engineerin; Harish M, Malnad College of Engineering; Sujatha B R, Malnad College of Engineering shivukssp@gmail.com; harishmuralidhar@gmail.com; mursuj@rediffmail.com

Abstract: The growth in wireless communication technologies attracts a considerable amount of attention in mobile adhoc networks. All mobile hosts in an adhoc network are embedded with packet forwarding capabilities. Typical applications of these networks are outdoor special events such as conferences, concerts and festivals; places with no network infrastructure; cases of emergencies and natural disasters; and military maneuvers. It is decentralized and independent of infrastructure. Since mobile hosts in an adhoc network usually move freely, the topology of the network changes dynamically and disconnection occurs frequently. These characteristics make it likely for a mobile adhoc network to be separated into several disconnected partitions, and the data accessibility is hence reduced. Several schemes have been proposed to alleviate the reduction of data accessibility by replicating data items. Although the previous algorithms consider no restriction on the memory space in each mobile node for replication, it is impracticable. In this paper an attempt is made in studying two replication algorithms in which the memory space is restricted. Later an improvement over these protocols using threshold value is considered. Index Terms: Mobile Adhoc Networks (MANETs), Static Priority Method (SPM), Dynamic Priority Method (DPM)

114

Performance Comparison of TCP with Moving Gateway for Proactive and Reactive Protocol in Adhoc Network

MANISH MADHUKAR*, SMIT,SIKKIM; BINDU AGARWALA, SMIT,SIKKIM; SANGAPPA BIRADAR, SMIT,SIKKIM madhukar_ce@yahoo.co.in; bindu_agarwl@yahoo.com; srbiradar@gmail.com

A Mobile Ad-Hoc Network (MANET) is a decentralized network of autonomous and self organized wireless nodes. The paper tries to state about the performance of TCP with moving gateway in an adhoc network. The TCP with mobile IP gives the mobility support to the adhoc nodes. The moving gateway works as a common gateway for rest of the nodes that send traffic using the closest neighbors through all nodes that is within the range of intermediate node(s). The hop-to-hop transfer mechanism is continued throughout the network until destination is not reached. If any node is not receiving data in any way, it means the node is not connected with the gateway.

115

Security Protocols and Threats in Ad-hoc and Sensor Networks

Pradeep R*, IIIT-B pradeep.r@iiitb.ac.in

Security is an essential service in both wired and wireless communications. The success of ad-hoc and sensor networks strongly depends on the people’s confidence in its security. However the characteristics of

ad-hoc networks pose challenges and opportunities in achieving security goals, such as confidentiality, authentication, data integrity, availability, access control and non-repudiation. Authentication in ad-hoc networks is a core requirement for secure protocols and secure applications of ad-hoc networks. Thus security in ad-hoc networks is the main focus of this work. The paper gives an overview of the existing efficient security protocols suitable for both ad-hoc and sensor networks: Zero Common Knowledge(ZCK) protocol, Identity Certified(IC) Authentication protocol, SPINS. The last section of the paper discusses the challenging threats to ad-hoc and sensor networks which gives an in- depth analysis as to how robust an authentication protocol should be.

145

Signal Stability based QoS Routing (SSQR) for Mobile Ad Hoc Networks

Giriraj Chauhan*, IIT Guwahati; Sukumar Nandi, IIT Guwahati giriraj@iitg.ernet.in; sukumar@iitg.ernet.in

We propose an on demand quality of service (QoS) routing scheme named signal Stability based QoS Routing (SSQR), that provides QoS support in terms of bandwidth and end-to-end delay in mobile ad hoc networks (MANETs). SSQR is designed over Signal Stability based Adaptive Routing (SSA) and aims to find and maintain stable QoS routes in ad hoc network. The main objective of SSQR is to select QoS routes that can survive for longer period of time. This is accomplished with the help of signal stability which consists of signal strength and link stability . The performance of SSQR is extensively investigated by simulation in NS-2. Our results validate that SSQR represents an important improvement by selecting longer-lived QoS routes in mobile wireless networks.

Session 1B: Cellular System, Handover and Applications

Friday 3 rd August 2007

2-3:30PM

Paper

   

No

Title

Authors

4

Temperature monitoring and device control using ARM Processor and GSM Technology

 

Subhas Meti*, S G G S I E & T; Balasaheb Patre, S G G S IE&T Nanded subhasmeti@yahoo.com; bmpatre@yahoo.com

Advanced RISC Machine (ARM) microprocessors, that directly target products in this market at the convergence of computing, communication and consumer. And GSM is one of the most important technology in wireless communication system, which contains three main services of short message, speech communication and data communication. Aiming at the features of industrial process parameter acquisition of large quantity information about process variables working in field. The paper combined the GSM module and ARM processor, which is used to monitor the industrial process parameters data acquisition and monitoring the status, acknowledging and also to control the Field Devices, Using and GSM technology (SMS). The advantage of having ARM processor is that less power consumption. Power conservation is growing more important for many machines that we use every day. The main objective of the paper is to monitor process parameters, compare with the set point, if parameter value is about set point send an SMS to control room and stop the process else process will be continuously running. Key words: ARM processor, GSM technology.

 

Algorithm for the Selection of Reader Position to Realize

Aritra Choudhury*, Jadavpur University; Narendra Das, Jadavpur University; Subir Sarkar, Jadavpur University; Indibar Mondal, Jadavpur University aritra_choudhury@yahoo.co.in; naren_ju@yahoo.com; su_sarkar@hotmail.com; indibar_m@yahoo.com

113

Efficient and Economic RFID System

The basic elements of a RFID network are readers and tags. Generally, the RFID network consists of several readers and a numerous number of tags. Now-a-days, practical RFID networks contain up to several hundred tags and for controlling their operation only few readers. For a decent work environment, it is extremely necessary to position the reader at a suitable location relative to the tags so that it is possible to control the operation of all the tags through the command (signal) issued by the reader satisfactorily. Our present work describes an algorithm and its implementation in software to find the position of the reader for controlling the operations of hundreds of tags according to the necessity of the user.

125

Dedicated Short Range Communication for Collision Warning System

 

RAJESHWARI HEGDE*, BMS COLLEGE OF ENGINEERING rajeshwari.hegde@gmail.com

In order to achieve a safe automotive society, it is necessary to develop an on-board intelligent system by the Inter-Vehicle Communications (IVC). We all want to avoid the vehicular collisions under almost all situations such as intersections, highways, and blind corners by using IVC technology through wireless ad hoc networks. In this paper, we focus on the suitability of DSRC for a class of vehicular safety applications called Cooperative Collision Warning (CCW), where vehicles periodically broadcast short messages for the purposes of driver situational awareness and warning.

34

Context-Aware End-to-End Connectivity Management

Jaydip Sen, P. Balamuralidhar, M. Girish Chandra, Harihara S.G., Harish Reddy Embedded Systems Research Group, Tata Consultancy Services, Bangalore- 560066, India, emails: {jaydip.sen, balamurali.p, m.gchandra, harihara.g, h.reddy}@tcs.com

In a dynamic heterogeneous environment, such as pervasive and ubiquitous computing, context-aware adaptation is a key concept to meet the varying requirements of different users. Connectivity is an important context source that can be utilized for optimal management of diverse networking resources. Application QoS (Quality of service) is another important issue that should be taken into consideration for design of a context-aware system. This paper presents connectivity from the view point of context awareness, identifies various relevant raw connectivity contexts, and discusses how high-level context information can be abstracted from the raw context information. Further, rich context information is utilized in various policy representation with respect to user profile and preference, application characteristics, device capability, and network QoS conditions. Finally, a context-aware end-to-end evaluation algorithm is presented for adaptive connectivity management in a multi-access wireless network. Unlike the currently existing algorithms, the proposed algorithm takes into account user QoS parameters, and therefore, it is more practical.

   

SUMIT KUNDU*, IIT KHARAGPUR; Dipta Das, N.I.T Durgapur; Amit Acharyya, sumitkundu@yahoo.com;

Performance of Voice / Data Integrated Services in Cellular CDMA in Presence of Soft Handoff

dipta_chaudhuri07@rediffmail.com;

39

amit.acharyya@gmail.com

Effects of soft- handoff (HO) on voice/data integrated services have been presented in this paper. Outage of voice is considered while performance of packet data transmission using multi-code (MC) CDMA is evaluated on basis of throughput and delay in integrated CDMA in presence of soft HO. Influence of physical layer issues like soft HO parameters, shadowing correlation, power control error (pce) on voice/data performance has been investigated. The impact of higher data rate and voice user on data performance is indicated.

 

Adaptive Data Transmission in Cellular CDMA with Variable Spreading Gain in Presence of Soft Handoff

SUMIT KUNDU*, IIT KHARAGPUR; Dipta Das, N.I.T Durgapur sumitkundu@yahoo.com;

77

dipta_chaudhuri07@rediffmail.com

An adaptive data transmission scheme based on variable spreading gain (VSG) is studied in cellular CDMA network in presence of soft handoff (HO). The processing gain is varied depending on channel traffic intensity satisfying a requirement on data bit error rate (BER). The overall performance improvement due to processing gain adaptation and soft HO is evaluated and compared with a fixed rate scheme. The influence of soft HO parameters on rate adaptation and throughput and delay performance of data is indicated.

Session 2A: Embedded Systems

Friday 3 rd August 2007

4-5:30PM

Paper

   

No

Title

Authors

13

DESIGN AND DEVELOPMENT OF FILL-GUN A SPECIAL DATA STORAGE DEVICE

Shivalingappa Hunagund*, BVBcet Hubli; Anil Nandi, BVBcet Hubli shiva_mh@yahoo.com; anilnandy@bvb.edu

ABSTRACT: This work is carried out at SLN Technologies, Bangalore for the defense application. Fill gun is a data storage device used in military applications to download the data from the PC. The downloaded data is transferred to other fill gun units and also to the communication radios located in the battlefield. The implementation of this project involves Design, Development, Fabrication, Hardware and Software Testing, Verification and Validation. Here the data is downloaded from the PC by connecting the fill-gun to the serial port and running the fill gun software on the PC. The stored frequency range is 225 MHz to 399.75 MHz. The data stored in the fill gun is transferred to other fill gun units using RS232 cable at the baud rate of 9600 bps. Communication is implemented via an industry standard serial interface. Fill-gun is designed and developed using the AT89LS8252 micro controller, Max3221 transceivers and using Max856 DC to DC converter

38

Development Life Cycle for Complex Embedded Systems Design

SHRIDHAR AITHAL*, NMAM INSTITTUTE OF TECHNOLOGY drsaithal@yahoo.com

Complexity in embedded systems has been increasing as a result of growth in IC implementation technologies on one hand, ever increasing requirements for system functional and non functional features on the other. Driven by the cost increases involved in the higher density chip technology and design gap existing in the embedded system design community, more attention is being paid to multiple processor or component architecture as a solution of designing complex embedded systems. In this article, an attempt is made to get a big picture of the complex embedded systems design and summarize the design life cycle for embedded systems. While advocating a need for a generalized framework for complex embedded system design we also point out the need for more work in areas of accurate modeling, code generation, dynamic hardware and software partition, gap modeling and wrapper generation. A generalized case study is planned to emphasize the need for a frame work.

 

Temperature, Wind Speed and Wind Direction Data Acquisition System

ATISH GUPTA*, PEC; Neelam Prakash, PEC atish_pec@yahoo.co.in;

89

pneelam2002@yahoo.com

Knowledge of temperature, wind speed and direction course during a certain time is needed in scientific, industrial and weather monitoring applications. The purpose of this paper is to discuss about the development of the temperature, wind speed and direction logging systems by using a microcontroller and computer interface. The specific solutions are considered for the creation of embedded system by modulus principle for data acquisition, processing and visualization, intended for giving of short-term weather forecast. Product includes measurement, displaying, and recording on the basis real time constraints.

Recording include storing of data in a non volatile EEPROM at regular acquisition time intervals (1 minute up to 1 hour). Both memory size and the recording interval decide the quantity of the data. Transfer of the recorded data is done through serial port communication. User gets a formatable output in terms of lists, tables, charts and diagrams on computer. Whole architecture of the microcontroller including advanced programming techniques at microcontroller and computer end.

143

An Embedded System-on-Programmable Chip (SOPC) for a Multi-sensor Autonomous Robot.

Prabhakar Mishra*, PES Institute of Technology; Shankar H, PES Institute of Technology; Ashutosh Pathak, New Horizon College of Engineering prabhakar.mishra@pes.edu; hnshankar@pes.edu; abhishekpatha@gmail.com

Path planning and obstacle avoidance are the two major issues in any autonomous navigation system. This necessitates the use of (i) multiple sensors on a robust and real time processing platform which is computationally efficient; and (ii) a set of heterogeneous actuators. Also, conflicting specifications must be concurrently met. We present here a design methodology for an embedded system-on-chip and its implementation targeted for an autonomous navigating robot. The concern is to meet constraints such as payload, placement, response time, throughput, power consumption and control. We leverage the architectural advantages offered by programmable ASICs and use them to ensure modular, distributed and fault-tolerant implementation. With a strategic mix of software-hardware load sharing, we demonstrate substantially enhanced overall performance.

166

Remote Temperature Monitoring using an Embedded Computer

MAYANK AGGARWAL*, VIT, VELLORE mayankaggr@gmail.com

The concept of applications that can operate independently and automatically with minimal human interaction find appeal in various areas ranging from home to the far frontiers of the space. One such area is remote temperature monitoring. The solution uses the TINI a Java enabled embedded computer connected to a network of 1-wire devices. The TINI is used to collect and transfer data to a remote server for storage and processing, using either a wired or a wireless interface. The 1-wire devices connected to TINI can be accessed any time over the network by using application like web browser where the TINI acts as a platform providing the communication. The system also provides an instant visual feedback via a local LCD display connected to a serial port of TINI for real-time monitoring. The modular approach followed in the development of the system allows additional 1-wire devices to be integrated to the present system.

Session 2B: Fuzzy Logic, Grid Computing and Location Based Services

Friday 3 rd August 2007

4-5:30PM

Paper

   

No

Title

Authors

59

Intelligent System for Most Suitable Crop

HEMANT BARADKAR*, JDIET Yavatmal hmbaradkar@rediffmail.com

There are many definitions of intelligence. A person that learns fast or one that has a vast amount of experience

could be called "intelligent". However for our purposes the most useful definition is the systems comparative level of performance in reaching its objectives. Agriculture comprises much of the Indian land area and is critical

to environmental economic and social sustainability. Intelligence Cropping System to improve yield from Crops is

a system to predict the name of crop that will give maximum yield and this crop will be more suitable for a

particular type of soil & atmospheric condition. Maximum yield from crops depends on the various soil parameters. In this system total 15 important soil parameters and 22 crops are considered. This system uses the hardware part which is interfaced with PC to form a Intelligent system for prediction of crop. The software used is

MATLAB with Fuzzy logic toolbox. The hardware part comprises of transducer/sensors, ADC 0809 is used to convert the analog quantity to its equivalent digital quantity which is given to the system model. Input to the system are soil parameters which are sensed using transducers and are converted in to equivalent digital values using ADC. The hardware part is interfaced to PC using RS232 bus. The output of a system is one most suitable crop depending on the current parameter of soil.

 

POWER SYSTEM STABILITY USING FUZZY LOGIC CONTROLLER

Indpreet Kaur*, Student- pEC, chandigarh; Balwinder Singh, professor indpreet@rediffmail.com;

70

balwindersingh658@yahoo.com

This paper proposes a fuzzy based coordinated control scheme using Heffron-Philips model, which decides the operating regions of local control laws, such as, small signal controller. The proposed controller accepted two fuzzy inputs, speed deviation and change in angle. These signals were computed using fuzzy membership function. The objective of this paper is to study and design the fuzzy logic based power system stabilizer used for the small signal stability analysis. This is based on the implementation of fuzzy logic technique to power system stabilizer to improve system damping. The effectiveness of the fuzzy logic PSS in a single infinite bus will be carried out by simulink block design and MATLAB 7.0. The performance was compared with power system stabilizer (PSS) and without PSS.

180

Fuzzy Decision Support System for Diagnosis of Esophagitis

Santosh Saraf*, Gogte Institute of Technology santoshsaraf@hotmail.com

In this paper, we present a Fuzzy Decision Support System for diagnosis of Esophagitis. It is a condition of inflammation of the Esophagus. The condition is detected by inserting an endoscope in the Upper Gastro- Intestinal tract. The Upper GI tract covers the esophagus, duodenum and the stomach area. The endoscopist observes the area and captures images of the parts which aid for diagnosis of a condition. The images are analyzed by the endoscopist and based on the experience and the knowledge of the endoscopist, the condition

is

diagnosed. We have designed a Fuzzy Decision Support System which aids this process. Erosive and Non-

Erosive Esophagitis are considered.

 
 

137

Centralized Resource Discovery using Mobile Agents in Grid and its Efficient Retrieval

Deepak Khandelwal*, IIT Roorkee; Padam Kumar, IIT Roorkee deepjagdish@gmail.com; padamfec@iitr.ernet.in

A

computational grid system is basically an infrastructure that facilitates sharing of networked resources and

location-independent access to these resources. Resource Discovery forms a very important part of such a

system. Majority of the existing techniques in use for resource discovery are reactive in nature, i.e. they cause a request for a resource to initiate the discovery of resources at various sites of in the grid. In this paper, we have proposed a framework which offers a proactive approach to resource discovery. We have discussed the design

of

a module Service Repository that may be maintained at a single or multiple sites that stores the freshest

possible information about the availability of resources throughout the grid. This data is kept as fresh as possible with the use of Mobile Agents that are created and dispatched for various sites for the purpose of gathering resource related information from those sites. The several different techniques in which this can be done are discussed along with the pros and cons of each. Efficient retrieval of the accumulated information also plays a very important role. We have proposed a novel usage of trees to efficiently process the query of a site that contacts the Service Repository to check for availability of resources in the grid. We have implemented the mobile agents using Java Aglets.

 

3

GPS LOCATION BASED MOBILE EMERGENCY SERVICES

Deergha Rao Korrai*, Osmania University; Kotesh Sharma V, Osmania University korraidrao@yahoo.com; koteshvsharma@yahoo.co.in

The knowledge of mobile users location by the service provider can enhance the class of services and applications that can be offered to the mobile user. These class of applications and services, aretermed as location based services.The future 4G systems promise to handle an integration of different services(e.g. operate GSM and GPS at the same time. In this paper, a simulator version of Location based mobile emergency service system is designed by using personal computers and microcontroller. The design is implemented using AVR AT90S8515 Microcontroller, and Personal Computers. One computer with LINUX operating system is used for GPS receiver simulator at the side of emergency service required mobile user. The other computer displays positioning of the mobile user on the corresponding digital map at the emergency service provider side to track the corresponding service required mobile user

   

Saptarshi Debroy*, Jadavpur University; Sabyasachi De, Jadavpur University; Saikat Das, Jadavpur University; Angshuman Chakraborty, Jadavpur University

Location, Device and User Profile Sensitive Mobile Yellow Pages

rishidr007@yahoo.com;

sabyasachi_ju2006@yahoo.com;

 

55

 

saikat1231@rediffmail.com; tantaju@gmail.com

Advertising on mobile devices has large potential due to the very personal and intimate nature of the devices and high targeting possibilities. Keeping in mind that next phase of electronic growth will be in the area of mobile e-commerce the translation from commerce has already started. Context sensitive mobile advertising is a stepping stone in path of this translation. In this paper we have presented a framework of a context sensitive mobile advertising system which works independent of the service provider to provide the mobile user pull based advertisement depending upon the current location, device type and mobile user profile. The paper discusses related works of other context sensitive advertising systems and the difference of our system with them. This paper also shades light on the possible ways to make the system interactive to such extent so that a user can

order for products and services through the mobile device itself.

Session 3A: Multimedia and DSP

Saturday, 4 th August 2007 11AM- 1PM

Paper

   
 

No

Title

Authors

 

12

Computationally Efficient MCTF for Scalable Video Coding

Karunakar K*, MIT; Kumkum Garg, Mit Manipal k_kotegar@yahoo.co.in; kumkum.garg@manipal.edu

In 3D-wavelet video coding framework, the temporal filtering is done along the trajectory of motion using Motion Compensated Temporal Filtering (MCTF). Hence computationally efficient motion estimation technique is the need of MCTF. In this paper a predictive technique is proposed in order to reduce the computational complexity of MCTF framework, by exploiting high correlation among the frames in a Group Of Picture (GOP). The proposed technique applies coarse and fine search of any fast block based motion estimation to the first pair of frames in a GOP. The generated motion vectors are supplied to next consecutive frames and only fine search is carried out around those motion vectors. Hence coarse search

is

skipped for all the motion estimation in a GOP except for the first pair of frames. The technique is tested

for different fast block based motion estimation algorithms over the different standard test sequences. The simulation result reveals substantial reduction (i.e. 41% to 66%) in the number of search points of motion estimation without compromising the quality of the reconstructed video compared to non-predictive techniques. Since the motion vectors of all the pair of frames in a GOP except the first pair will have value ±1 around the motion vectors of the first pair of frames, the number of bits required for motion vectors are also reduced by 50%.

 

A block based thinning

Nitin Gupta*, NIT Hamirpur; Sarvendra Kumar, NIT Hamirpur gupta3041@yahoo.co.in; sarvendra.kumar@gmail.com

 

16

algorithm

Thinning algorithms are widely used as a useful method of pre-processing in image process. In this paper,

high-speed thinning algorithm (useful for character recognition) is proposed. The whole of the input image is broken in small units and thinned image is obtained by applying the proposed algorithm. Some fundamental requirements of thinning and the shape of pattern are preserved very well. Algorithm is very robust to noise and eliminate spurious branch. The results of applying the algorithm on variety of images has been shown.

a

 

19

MODEL BASED TRACKING

SUMANTH REDDY K*, NITK SURATHKAL KSKR.SUMANTH@GMAIL.COM

This paper presents an iterative method for tracking and classifying human activities in a video sequence. The basic idea is that activities can be positively identified from a sparsely sampled sequence of a few body poses acquired from videos. Connected Graph representation has been used to store the 2D human poses. Then these samples are matched against the graph abstractions derived form the frame where motion is identified in the video sequence. Sum of Absolute Differences method is used for motion detection in video frames. The probability of false activity detection drops exponentially with the increased

number of sampled body poses. The proposed method gives very good results for activity detection in the surveillance video.

49

Segmentation & Comparison of Digital Video

Ranjan Parekh*, Jadavpur University ranjan_parekh@yahoo.com

Over the last decade there has been a huge proliferation on the use of multimedia content throughout the world. As such an efficient and fast mechanism for retrieval of media content from multimedia repositories assumes fundamental importance. This paper addresses the problem of segmentation of digital video and their characterization for similarity comparison and retrieval in a video database. Segmentation of video to detect cuts and identify shots is done using differential values of adjacent frame contents. Thereafter the shots are characterized using features derived from Grey Level Co-occurrence Matrix (GLCM) computed from representative frames. A set of four directional normalized symmetrical GLCMs, one in each direction 0º, 45º, 90º and 135º, are use for computation of the features. Comparison of video content for similarity retrieval is based on a combined set of GLCM features in an appropriate feature space.

58

Semantic Characterization of Visual Media

Ranjan Parekh*, Jadavpur University ranjan_parekh@yahoo.com

Content based image retrieval techniques generally utilize low-level features to search, compare and retrieve images from databases. However the major limitation is that they fail to provide sufficient information about the semantic content of the media. Semantic characterization is necessary because humans tend to search or query for media based on their semantic features i.e. their meanings and associations with real-world objects. However semantic concepts being based on human abstractions, unique definitions for their characterization do not always exist. Moreover automated systems cannot directly understand the semantics inherent in media content. This paper proposes a methodology involving visual keywords whereby semantics can be inferred from visual media through comparison of low-level features.

69

Classification of Environmental Sounds

Ranjan Parekh*, Jadavpur University ranjan_parekh@yahoo.com

In a content based storage and retrieval (CBSR) scenario, this paper addresses the problem of classification of environmental sounds. Even though a substantial amount of research work has been done in the area of speech and music recognition, relatively less work has been done for environmental sound classification. One reason for this is possibly the extreme difficulty in accurate classification due to the large variations inherent in such sounds. This work uses statistical measures derived from zero crossing rate (ZCR) and root mean square (RMS) values of audio samples and plots them in a combined feature space to discriminate between three classes of environmental sounds.

Session 3B: Cryptography and Network Security

Saturday 4 th August 2007 11AM- 1PM

Paper

   

No

Title

Authors

5

COMPARATIVE ANALYSIS ON ALTERNATIVE SCHEMES FOR USER AUTHENTICATION

Naveen Kumar*, Jamia Millia Islamia, New Delhi; Prof. M.N. Doja, Jamia Millia Islamia, New Delhi naveenkr_singh@rediffmail.com; ndoja@yahoo.com

Abstract-User Authentication is the procedure of determining whether a user should be allowed access to a particular system or resource. Today, the alphanumeric passwords are used broadly for authentication, but other methods are also available, including biometrics, graphical passwords and smart cards, however, there are merits and demerits of these alternative technologies. Alphanumeric password based authentication system are simpler to administer and manage by user, As a result, these passwords are expected to continue to remain so for some time [1]. With all these advantages alphanumeric passwords contains well-known deficiencies with compromises on the security known as password problem[2]. Graphical password ensures the high memorability of the user authentication, however the usability issues are still focused area for research. Apart from these schemes biometric authentication promise the highest level of security but generally not affordable. We have studied and analyzed schemes those are mainly based on what you know like alphanumeric password, graphical authentication and schemes based on what you know & what you are like dynamic signature verification, voice authentication, audio-visual authentication and, password based on thoughts. This paper will be useful for information security researchers and practitioners who are interested in finding an alternative to user authentication schemes.

51

Network Security: Vulnerability in TCP/IP- A Secure Solution

Parikshit Mahalle*, SKNCOE, Pune; Geeta Navale, SKNCOE, Pune; Kishor Honwadkar, DYPCOE, Pune; Vinod Kimbahune, SKNCOE, Pune; Shaffi Pathan, SKNCOE, Pune parikshitmahalle@yahoo.com; sendmailtogeeta@yahoo.com; knhonwadkar@yahoo.com; vinodkimbahune@yahoo.co.in; spathan@rediffmail.com

Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more people become wired, an increasing number of people need to understand the basics of security in a networked world. In this document we discuss some of the network security issues in TCP/IP. The Transmission Control Protocol/Internet Protocol (TCP/IP) [1] suite is a very widely used technique that is employed to interconnect computing facilities in modern network environments TCP/IP is the language of the Internet. Anything that can learn to speak TCP/IP can play on the Internet. However, there exist several

security vulnerabilities in the TCP specification and additional weakness in a number of widely available implementations of TCP. These vulnerabilities may enable an intruder to attack TCP-based systems, enabling him/her to hijack a TCP connection or cause denial of service to legitimate users. We discuss some of the flaws present in the TCP implementation of many widely used operating system and provide recommendations to improve the security state of a TCP-based system, e.g., incorporation of a timer escape route from every TCP state.

62

Performance of Forward Secure Signature Schemes

Krishna Prasad*, IIIT Bangalore krishna.prasad.n@iiitb.ac.in

With the rapid growth of untrusted mobile environments, forward secure signature schemes have significantly received more attention than the ordinary digital signature which faces difficulties with key exposure. The technique of forward security helps to mitigate the damage caused by the exposure of secret keys. The principle behind the Forward Security is that the secret keys are updated at regular intervals of time and it does not allow the adversary to break the scheme for any prior time period. This survey paper provides a detailed description about the different types of forward security schemes and then deals with the comparison of various generic forward secure schemes based on their individual relative performances.

 

Study and Analysis of Security Risks in VoIP Application:Various Approaches and Solutions

Nagaraj Cholli*, IIT Roorkee; Kirit Modi, IITR

nisu201182@gmail.com;

66

 

kiritmodi@rediffmail.com

As VoIP technology becomes more widely deployed due to its economical advantage over traditional PSTN services, however, there are several security risks. In this paper, several such security risks are discussed. This paper explains the security risk factors associated with IP telephony-based networks .It also outlines steps for helping to secure an organization’s VoIP network. and provides an overview of possible solution concern to those security risks. In this context we provide a brief overview of a general architecture of VoIP infrastructures and possible attack scenarios on VoIP servers utilizing the SIP signaling protocols, attacks on DNS and ENUM which are used for address resolution and STUN which is used for NAT traversal. Further, we present various approaches for securing service components in the Internet and discuss their suitability for VoIP services.

74

Virus in Mobile Phones

Vaishnavi Subramanian*, IIIT-B vaishnavi.subramanian@gmail.com

Mobile phones and handheld computers have become a target for attacks and a vehicle for malicious code. With the exponential growth of these device population combined with the convergence of networks, it will be much devastating compared to PC based viruses, worms and Trojan horses. The trickle of malicious programs that embarked upon Symbian in 2004 has become a constant stream threatening to become a torrent spawning a multitude of families. The attacks could range from installing malicious software that deletes personal data, running up a victim's phone bill by making toll calls or sending a SMS/MMS to degrading or overloading mobile networks with denial of service (DOS). It took couple of decades for computer virus to evolve but only a couple of years for the mobile virus to cover the same ground. This paper introduces some of the pernicious Mobile Viruses, Worms, Trojans and their mode of propagation as a study. This paper also proposes how these malicious software can be prevented in a proactive way.

79

Key Management for Cumulative Member Removal in Secure Group Communication

Poornima A.S.*, Siddaganga Institute of techno; R. Aparna, Siddaganga Institute of technology

aspoornima@sit.ac.in;

raparna@sit.ac.in

Many applications like pay-per-view, distribution of digital media etc., require secure group communication services in order to deliver packets from one or more authorized senders to a large number of authorized receivers. The main issue in secure group communication is group dynamics and key management. A scalable secure group communication model ensures that whenever there is a membership change, new group key is computed and distributed to the group members with minimal computation and communication cost. Handling member removal(leave) is more complex than member join event in any secure group communication model. In this paper m-ary tree structure is used, with number of keys at each level being m. Here, we address cumulative member removal(leave) and present protocols that minimize the number of messages required to distribute new group key to remaining members in the group. The issues related to two members removal(leave) and cumulative arbitrary members removal are handled separately.

Session 4A: Multimedia and DSP

Saturday 4 th August 2007 2PM-3:30 PM

Paper

   

No

Title

Authors

76

Quality and Performance of Video Network with the actual Video Systems Products

Emilio Jose Arruda Filho*, University of Bergamo ; Itamar Brito, Institute of Studies in Amazon; Katia Araujo, Institute of Studies in Amazon; Cyntia Nazare Ribeiro, Institute of Studies in Amazon emilio.arruda@unibg.it; itamar@dpf.gov.br; katia.araujo@yahoo.com.br; cyntiarn@yahoo.com.br

This article analyze the communication form from the video services group, which is developed between two or more users, containing images, data and voice transmission, to facilitate the mobility problems in big companies. These video conference systems which are applicable on many organizations are validated based on the Brazilian Federal Police situation, observing the product, the market and the service developed for them. For example, we will be presenting the system used at one department of that institute denominated TELECENTRO, where the implanted structures, such as the service and quality transmission, are evaluated based on the performance and broadband. This system operates in all national federation units and remote cities.

   

.

Rajeev Yadav*, Center for Air Borne Systems;

Signal Processing for Real Time Multi- channel GPS Software Receiver

Nomi Sonowal, Center for Air Borne Systems

rajeevyadav1981@yahoo.com;

102

 

nomi801@rediffmail.com

This paper describes a new approach for real time implementation of 12 channels tracking of GPS L1 C/A PRN signals for software based GPS receiver on TigerSHARC platform. The main objective of this paper is to bring out overall signal processing flow from ADC to Tracking for a good number of satellites. These methods were first developed in the Matlab and then real time implementation was done on TigerSHARC DSP platform running at 500MHz. The whole platform consists of RF portion, FPGA and TigerSHARC DSP. The sampled one-bit data comes from GPS RF front-end module, which consists of single stage down conversion followed by ADC section. The GPS signal is CDMA using direct sequence to bi-phase modulate the carrier frequency. FFT based correlation is used for signal acquisition to determine the carrier frequency and code phase for each of satellites. Acquisition is followed by Carrier Pull-in module, which gives close carrier frequency in the tracking range. Acquisition to tracking transition includes the estimation of PRN Code shift over a period of time and the modeling of ADC sampling clock error. Time taken by Acquisition and Carrier Pull-in module is important for a real time scenario. For achieving real time tracking, the ADC sampling clock characteristics are found out and modeled. Tracking module consists of code tracking loop and carrier tracking loop. An efficient way of implementing a MAC operation suitable for early, late and prompt correlation on a digital signal processor is presented. This approach makes efficient use of logical XOR instruction of the DSP. All the algorithms of GPS signal processing were integrated with Navigation processing module (satellite and user position computation) and are tested and validated using Spirent communications 12 channel GPS simulator

135

Digital Sound Processor for Auditory Prostheses

Rajakumar Kontham*, Andhra university; Seetha ramaiah P, andhra university; Damodar rao Y, andhra university rajakumar_au@yahoo.com; psrama@gmail.com; yamkumar@gmail.com

Auditory Prostheses is an electronic device that partially replaces the functions of the human ear. Unlike a hearing aid, it does not make sound amplification or filters the noise signal but instead bypasses normal hearing operation to directly stimulate the auditory nerve with electric current allowing hearing impaired persons to receive sound. Auditory Prostheses is an artificial replacement of damaged inner ear using external body worn speech processor and internal receiver-stimulator for stimulating auditory nerve via electrode array that enables understanding the speech by brain. Speech processor receives an external sound or speech and generates encoded speech data bits for transmission to receiver-stimulator. Development of the Digital Sound Processor for Auditory Prostheses (DSPMAP) is based on the ANALOG DEVICES Digital Signal Processor ADSP-2185 is described. The DALLS DS89c420 microcontroller is used as data encoder to send speech information from speech processor to receiver-stimulator via RF transcutaneous link. The system comprises a Digital Sound Processor, Microcontroller based Data Encoder, a Radio Frequency Transmitter using Amplitude Shift Keying (ASK), ASK receiver, Receiver- Stimulator, and an Electrode Array of six electrodes. Continuous Interleaved Sampling (CIS) speech processing algorithm is implemented for the sound processor. A multi-channel cochlear implant with six electrodes or simulated resistance array can be driven by the receiver-stimulator for testing its performance. The implementation aspects of CIS algorithm are validated using the test data of speech samples. The results are presented using laboratory model of receiver-stimulator and simulated electrode resistance array with a high-speed data acquisition system.

136

Low Power VLSI Architecture for Efficient Motion Estimation in Video Codec Chip

RANJAN MAITY*, IIT, Kharagpur; MONALISA SARMA, IIT, Kharagpur; DEBASIS SAMANTA, IIT, Kharagpur ranjan_iitkol@yahoo.co.in; monalisas@cse.iitkgp.ernet.in; dsamanta@iitkgp.ac.in

With the present advancement of communication and information technology, the requirement of a low power video codec chip is highly on demand particularly in battery operated hand-held mobile applications. In this work, we have proposed a VLSI architecture for motion estimation task in video coding. For motion estimation we have considered the TBHEX block matching algorithm [1]. Synthesis of the proposed architecture with Synopsis Design Analyzer tool reveals as few as 30K gate count including memory within the chip boundary and 22.14mW power requirement. This is indeed a significant improvement compared to the existing low power architectures reported till date.

154

Generation of Super-Resolution Video from Low Resolution Video Sequences with Improved Lightening and Temporal Resolution

T MADHU SUDHAN*, NITK SURATHKAL; Alwyn Pais, NITK SURATHKAL tmadhusudhan@gmail.com; alwyn.pais@gmail.com

An algorithm for enhancing the resolution of video through histogram based segmentation and frequency domain registration is proposed. Segmentation of the video is done using Histogram method and frequency domain approach is used for registration of images. Bi-cubic interpolation is applied to this video to generate the super-resolution (SR) video. The algorithm has been tested on indoor/outdoor video sequences and very good visual results are obtained. Based on the requirements additional brightness and temporal resolution can be added to the SR video.

Session 4B: Cryptography and Network Security

Saturday 4 th August 2007 2PM-3:30 PM

Paper

   

No

 

Title

Authors

 

Implementation Of Cryptography

Anusuya KV*, PSG College of Technology; Subha Rani S, PSG College of Technology anusuya@mail.psgtech.ac.in; subharani@mail.psgtech.ac.in

In

Routers Using Network

96

Processor IXP 2400

The Network Processors (NP) are designed for a wide range of access and edge applications including multi service switches, routers and deep packet inspection. The NPs are fully programmable Processors which utilize the technological advancements such as Hyper Task Changing which enables them to perform number of simultaneous operations. This ensures full network performance and also accommodates complex services such as security on a packet basis. In this paper, the NP has been configured as a Router and the performance statistics of the NP under RSA algorithm has been assessed. Since Network Processor can be configured on different design mapping, Cryptography has been included as part of Protocol Suite to provide security at line speed. It is well known that RSA is an implementation of the more general concept of Public key cryptography method for encrypting messages. Hence, Cryptography on packet basis has better performance and flexibility on a Network Processor.

 

Implementation and Performance Analysis of Novel Authentication and Key Agreement Protocol for UMTS

PRABHU K*, PSG College of Technology

117

k_prabhu5@yahoo.co.in

In this paper implementation and performance analysis of 3G UMTS authentication and key agreement protocol (AKA) are done. In section I, security of 3G UMTS is compared with GSM in terms various security features. In section II, existing and new protocols for different operating environment (when user is in home network and in visitor location) are discussed. In all these cases, new protocol has less number of message transactions compared to existing protocol, hence its authentication delay is very less. Low authentication delay reduces the time required for registration as well as call completion. As a result, the overall system performance can be improved. The implementation is done in MATLAB. Existing and new protocols are implemented for above mentioned different operating environments. The authentication delay required for registration and call initiation are computed when the program is executed on Pentium-IV and Pentium-D. The simulation results and performance analysis are shown and discussed in section-IV. Simulation results shows that new authentication protocol takes less time compared to existing protocol to complete the authentication process. Index Terms 3G UMTS, Authentication, Authentication protocol, Authentication delay, Registration and Call initiation time.

 

A

NEW MODEL OF DIGITAL

A.N.M. Rezaul Karim*, Islamic University Chittagong; Md. Golam Rabiul Alam, Islamic University Chittagong zakianaser@yahoo.com; gra9710@yahoo.com

SIGNATURE USING LSB HIDING,

120

RSA AND MERKLE-HELLMAN

 

CRYPTOSYSTEM

 

The security of data is very much important for both the sender and receiver. The security goal of information security consists of maintaining four characteristics: confidentiality, integrity, authentication and non-repudiation. The existing models of Digital Signature [2][5][6] provides integrity, authentication, non- repudiation and confidentiality. But in some cases it is very important to provide higher confidentiality to a message or digital signature itself. This paper proposed a new model of digital signature, which provide higher-level confidentiality of message and digital signature. The paper also describes the implementation procedure of the proposed model. The proposed model of digital signature composed the Least Significant Bit (LSB) hiding technique, Secure Hash Algorithm (SHA-1) of message digestion, Rivest-Shamir-Adleman (RSA) and Merkle-Hellman public key cryptosystems. The proposd model capable of hiding both the information and also the digital signature itself. It also provides message integrity, authentication and non- repudiation.

146

Chaos Based Look-Up Table Encryption scheme for Voice Data in Internet Telephony

Kiran Nagasubramanian*, College of Engineering; Dhinesh Kumar, College of Engineering Guindy; Duraisamy Radhakrishnan, College of Engineering Guindy; Mohan Raj, College of Engineering Guindy nkiran87@yahoo.com; dhinesh_anna2000@yahoo.co.in; rajaanna2004@yahoo.co.in; bmr_cse@yahoo.com

The paper proposes a novel chaos based encryption scheme for secure transmission of voice data in VoIP also known as Internet Telephony. The majority of consumer VoIP solutions do not support encryption yet. As a result, it is relatively easy to eavesdrop on VoIP calls and even change their content. There are several open source solutions that facilitate sniffing of VoIP conversations. Some vendors also use compression to make eavesdropping more difficult. However, real security requires encryption and cryptographic authentication which are not widely available. In the proposed method we make use of chaotic trajectory of period 65536.The iterated set of values for the corresponding chaotic map is sorted in ascending order and then indexed to create a lookup table. The voice data is grouped into 16-bit blocks and the corresponding decimal value times the chosen chaotic trajectory is iterated and the associated index value is referred from the look-up table. The process is repeated for all the 16- bit blocks of voice data.

150

An Efficient Montgomery Multiplication Algorithm

RICHA GARG*, UIET; Venkatesha K, CG-CoreEl; Renu Vig, UIET richa.garg1@gmail.com; Venkatesha@coreel.com; renuvig@hotmail.com

Modular multiplication is the most important arithmetic operation used in many cryptographic algorithms such as RSA and Diffie-Helman key exchange. This paper proposes an efficient Montgomery modular multiplication technique that employs multi-bit shifting and carry-save addition to perform long-integer arithmetic. The corresponding hardware realization is optimal in terms of area and offer high data throughput. To the authors knowledge, the results are better than any existing Montgomery technique. This optimization is also technology independent and thus should suit well not only FPGA implementation but also ASIC. The design has been evaluated on Xilinx Virtex-4 series for the practical bit lengths of 512, 1024 and 2048.

Session 5A: Phy, Modulation, OFDM and Sensor Networks

Sunday 5 th August 2007 11 AM- 1PM

Paper

   

No

Title

Authors

   

A.N.M. Rezaul Karim*, Islamic University

CONSEQUENCE OF THE IMPAIRED CHANNEL INFORMATION ON PERFORMANCE OF THE MIMO SYSTEM

Chittagong; Md. Abdur Rahim, Islamic University Chittagong; Md Mijanur Rahman, Multimedia University, Malaysia zakianaser@yahoo.com; a_rahim75@yahoo.com;

104

mijanur2003@yahoo.com

In this paper, the consequence of the impaired channel information on received SNR over Multiple Input Multiple Output (MIMO) channel was investigated. MIMO channel was converted into equivalent independent parallel channels through SVD (Singular Value decomposition) of the channel matrix. Levels of degradations of MIMO channel efficiency due to impairments in the available channel information at the transmitter and the receiver has been shown through simulations. It has been observed in the simulation that maximum received SNR is obtained when transmitted signal distribution among transmit antennas and received signal combination is matched with channel gains of the equivalent parallel channels.

 

Performance Evaluation of M-QAM with Dual-Diversity EGC in Rayleigh Fading Environment

SOUMENDRA DATTA*, N.I.T., DURGAPUR

161

soumendra_13@yahoo.co.in

M-ary quadrature amplitude modulation (MQAM) is a spectrally efficient modulation scheme to achieve high rate transmission without increasing the bandwidth and it is used for video transmission applications in third and forthcoming generations of wireless networks. This paper presents accurate and computationally efficient average symbol error probability (SEP) of square MQAM employing dual branch predetection equal gain combining (EGC) through probability density function (PDF) approach. The fading channel is modeled as frequency non-selective, slow, independent and identically distributed (i.i.d.) Rayleigh fading channel corrupted by additive white Gaussian noise (AWGN). Two models of MQAM receivers are analyzed and their error performances are compared. The closed form solutions, composed of elementary (algebraic and trigonometric) functions are sufficiently simple so that no approximation is needed for numerical computation and general enough to remove the limitations of previous studies in the literature which include infinite series expressions. Moreover, the proposed analysis offers a combined framework to evaluate the error performance of other modulation schemes like differentially encoded phase shift keying (DEPSK) with coherent detection, quadrature phase shift keying (QPSK), offset QPSK (OQPSK) and minimum shift keying (MSK).

   

G.

Santhosh Kumar*, Cochin University;

Anil C. B., Cochin University;

K.

Poulose Jacob, Cochin University

CIBLA A Localization Algorithm for

san@cusat.ac.in; anilcb@cusat.ac.in;

168

Wireless Sensor Networks

kpj@cusat.ac.in

Ubiquitous, self-configuring sensor networks hold the potential of many new applications in monitoring and control. Localization in sensor networks has been attracting a large research effort in the past few years. In this paper, we present Circle Intersection Based Localization Algorithm (CIBLA), a range free localization algorithm for wireless sensor networks. The motivation of CIBLA is to get accurate location estimation with reduced communication overhead among the nodes and also to reduce the number of anchor nodes. We have implemented our algorithm and compared with existing range free algorithms. We claim some advantages in terms of computation cost, communication overhead and accuracy with the existing localization schemes.

   

Pragya Varshney*, Netaji Subhas Instt. of Tech.; Maneesha Gupta, Netaji Subhas Instt. of Tech.; Gangaikondan Visweswaran, Indian INstt. of Tech

Higher Degree Half Order Differentiators and Integrators

pragya.varshney1@gmail.com;

maneesha_gupta60@yahoo.co.in;

133

 

gsviswes@gmail.com

This paper presents discretization methods for s^r (fractional order differentiators) and s^(-r) (fractional order integrators) using first order and higher order operators. The key step in the digital implementation of a fractional order controller is the numerical evaluation or discretization of the fractional order differentiator. Taylor series expansion and continued fraction expansion have been used to discretize the half order differentiator and integrator. The models obtained are studied for stability. MATLAB simulation results are presented which match with the theoretical results in continuous time domain and which prove the effectiveness of the proposed technique. A Switched Capacitor realization of the discretized model of half order differentiator is also proposed.

170

Performance Investigation of Subspace Algorithm for MIMO

A.N.M. Rezaul Karim*, Islamic University Chittagong; Md. Abdur Rahim, Islamic University Chittagong zakianaser@yahoo.com; a_rahim75@yahoo.com

In this paper, the channel has been estimated blindly using subspace-based algorithm for Multicarrier Code Division Multiple Access (MC-CDMA) technique combined with Space-Time Block Codes (STBC) in the case of Multiple Input Multiple Output (MIMO) system and it is shown by computer simulation that for the MIMO channel of two transmit and two receive antenna of the proposed system with transmission efficiency of 1 bit/s/Hz, the BER degradation of blind channel estimation is about 2 dB compared to perfect channel.

Session 5B: WLAN, Bluetooth and Network Performance

Sunday 5 th August 2007

11AM-1PM

Paper

   

No

Title

Authors

 

A Comparative Analysis of Security Aspects of IEEE 802.11a and

Tejinder Singh*, Thapar University, Patiala.; Harpreet Jaswal, Thapar University, Patiala.; Anil Verma, Thapar University, Patiala. tejinder.s.bhandohal@gmail.com; harpreet.s.jaswal@gmail.com; akv_1001@yahoo.com

11

HiperLAN/2

Wireless Local Area Networks (WLANs) are becoming popular in home, enterprise and public access areas primarily due to their low cost, simplicity of installation and high data rates. Providing security within the wireless network is a challenge and it requires different techniques to overcome security hazards. 802.11 is the widely used standard to setup wireless LANs which is not untouched from various attacks and vulnerabilities. However, a new standard called HiperLAN can be used to achieve a maximum transfer rate and higher security as compared to IEEE 802.11. HiperLANs are particularly popular in Europe and have two different versions: HiperLAN/1 and HiperLAN/2. The presented work is a comparative study and analysis of HiperLAN/2 and IEEE 802.11a in context of security, accentuating security aspects of both these standards.

27

MULTIPATH LOAD BALANCING IN MPLS-BASED NETWORKS

SHIVA PRAKASH*, KEC Dwarahat, uTTRAKHAND; Rama Shankar Yadav, MNNIT, Allahabad shiva_pkec@yahoo.com; rsy@mnnit.ac.in

The research focused on best effort services in MPLS traffic engineering. The objective of this research work is to develop a framework which has static and stateless. It provides an acceptable level of performance over a wide range of network conditions by the use of modification bandwidth allocation. The modified bandwidth allocation distributes bandwidth fairly among all best effort users in multi-path and integrated with traffic engineering algorithm which is restricted to network topology. Apart from discussing of the modified bandwidth allocation, the implementation issues are shown by simulations using NS-2 with MPLS modules. The results of modified algorithm are comparing with that obtained for the case shortest first, disjoint optimal path and disjoin max-min. It is observed that modified algorithm has improvement over exiting.

29

Quality of Service in MAC for Wireless LANs

Jaya Lakshmi Aravapalli*, KLCE jvallabhaneni@hotmail.com

The original IEEE 802.11 standard has several problems in providing QOS service to stations. Thus, a large number of 802.11 QOS enhancement schemes have been proposed. This paper analyzes these schemes based on different parameters such as throughput, bandwidth utilization, average access delay and starvation in low priority data-frames. First we analyze QOS limitations of the original 802.11 MAC protocols as well as 802.11e. We also analyze different QOS enhancement schemes proposed for 802.11 and 802.11e based on QOS parameters.

61

MIB Object Browser for a Telecom Switch through SNMP

Sampath Kumar*, JNTU Anantapur; Raja Shekar, JNTU Anantapur darna.sampath@gmail.com; rajashekar1_r@yahoo.co.in

Abstract: the simple network management protocol (SNMP) is a widely used standard for management of devices in Internet protocol networks. Part of the protocol great success is due to its simplicity; all the managed information is kept in a management information base (MIB) that can be accessed using SNMP queries to a software agent. In this paper, we develop a general model that abstract the data retrieval process in SNMP. In particular, we study the amount of queries (communication) and time needed to randomly access an element in this model. It turns out that this question has practical importance. For some network management applications, e.g., MIB browsing, there is a need to traverse portions of a MIB tree, especially tables, in both directions. While the GetNext request defined by SNMP standard allows an easy and fast access to the next columnar object instance or next scalar object, there is no corresponding operator defined in the SNMP framework for retrieving the previous MIB object instance. This, in effect, allows s an efficient MIB traversal only in one direction and makes the search in the reverse direction problematic. This paper presents and analyzes the GetPrev application, a tool that enables the retrieval of the previous instances of a columnar objects or scalar MIB objects. Our GetPrev application uses only standard SNMP GetNext and Get requests to carry on a fast and bandwidth efficient search for the required object instance. For example, as predicted by our analysis and shown by our experiments, retrieving a value of the last columnar object instance in a large forwarding table (ipForwardTable) containing about 3000 entries can take several minutes using a sequence of the GetNext requests (the straightforward approach used, e.g., by widely deployed and applications). Index Terms: Get,GetNext,GetPrev, MIB browsing, network management, SNMP.

67

Enhanced Scheduling Mechanism of Bluetooth For Realtime Traffic

Jyoti Kodagali*, NITK,Surathkal; VinayKumar N, NITK, Surathkal jkodagali@gmail.com; vinay@nitk.ac.in

Bluetooth is a personal wireless communication technology and is being applied in many scenarios. Bluetooth

operates in the 2.4GHz ISM band provides short range, low cost, low power pico-cellular wireless connectivity.

It intends to become the Wireless Personal Area Network standard itself. The Bluetooth specification proposes

a Round Robin scheduler as possible solution for scheduling slaves in a Bluetooth Piconet. However, this basic

scheme results in wastage of slots and hence poor utilization of the network resources In this paper, we present two new polling algorithm for Bluetooth Piconet Look Ahead and Look Ahead Round Robin whose objective is to achieve high channel utilization (throughput). We present an extensive set of simulations and provide performance comparisons with Round Robin. And the results show that both LA and LARR achieves nearly 35% improvement in throughput over Round Robin. In this paper we view the MAC scheduling problem in Bluetooth as an online Bin Packing problem.

95

Implementation of SMPT Technique With Enhanced Congestion Control Mechanism Using Network Processor IXP 2400

Anusuya KV*, PSG College of Technology; Subha Rani S, PSG College of Technology anusuya@mail.psgtech.ac.in; subharani@mail.psgtech.ac.in

In a wireless system based on Multi code CDMA (MCDMA), TCP is incorporated as the transport layer protocol to stabilize the throughput over the wireless links by employing Simultaneous Mac Packet Transmission (SMPT) approach. In the existing technique, the jitter, loss rate and delay are optimized to provide the Quality of Service (QoS). In this paper, the traffic congestion control and capacity (the number of customers per cell) are also optimized along with the earlier parameters to enhance the QoS. This permits the usage of SMPT in Multi-user environment also. In the proposed technique, if the capacity exceeds the threshold and traffic congestion occurs, then the users are prioritized with the usage of active buffers. The size of buffer vary

according to the type of data transmitted. M/M/n queuing principle is used for the buffer management and to prioritize the users. Thus this system provides non-degradable service to all classes of users in addition to prioritized users. Since the technique is simulated in Network processor, which is configured as a router in the Wireless LAN (WLAN), the routing performance is improved and the network becomes adaptive to traffic variations. But the multi user environment created through the added services results in a trade off between Signal to Noise (S/N) ratio and Multiple Access Interference (MAI).

124

Simulation of QoS protocols of RPR (Resilient Packet Ring IEEE 802.17) in Network Simulator 2

ALPESH CHADDHA*, DELHI COLLEGE OF ENGINEERING; Arunesh Chaddha, Delhi College of Engineering; Kanishk Arya, DCE; Vikrant Agrawal, DCE; R.K. Sinha, DCE alpeshchaddha@yahoo.com; chaddhaarunesh@yahoo.com; kanishkarya@gmail.com; vikrantagrwal@gmail.com; dr_rk_sinha@yahoo.com

Resilient Packet Ring (RPR), also known as IEEE 802.17, is a standard designed for the optimized transport of data traffic over fiber rings. It is designed with a purpose of providing the resilience found in SONET/SDH networks (50ms protection) but instead of setting up circuit oriented connections, a packet based transmission is provided in order to increase the efficiency of Ethernet and IP services. The traditional SONET/SDH based metro network was designed to carry only the circuit switched voice traffic and hence with the growth of internet data traffic, a need was felt to build a metro to accommodate the increased data traffic. Gigabit Ethernet was proposed to take care of the data part but it had its own problems, like lack of QoS, fairness and a larger restoration time. It is at this juncture, Resilient Packet Ring (RPR) technology was proposed. The versatile nature provided by the packet based technology, allows RPR to provide several levels of Quality of Service (QoS) guarantees, to high priority real time traffics (voice and video services) like Class A and Class B and fairness to low priority non-real time data traffic (best effort service). This paper presents an attempt to improve upon the previously implemented features [1] like dual queue, classes of service, spatial reuse and bandwidth reservation and allocation along with the implementation of new features like dynamic and spatial bandwidth reservation and shortest path algorithm in NS2 and the trace file generated was used to plot the results.

134

On the Characterization, Evaluation and Analysis of Performance of Delay-Tolerant Networks

Deepak Nadig*, RV College of Engineering deepnadig@gmail.com

The Internet Protocol Suite, although widely used in almost every application is ill-suited for use in communication systems characterized by unpredictable link reliability, intermittent network connectivity, very high round trip times (RTTs) and wide variations in data rates (also asymmetric). Challenges exist in the transfer of data between networks where the availability of an end-to-end path between the source and the destination may be absent. These issues are overcome by the use of Delay-Tolerant Networking (DTN) Architectures and Protocols. This paper presents the performance evaluation and analysis of such networks. The performance of DTN Bundling protocol is measured utilizing a variety of metrics under different network conditions and scenarios, thus providing a comprehensive characterization of such networks.

Session 6A and 6B: Poster

Sunday 5 th August 2007 2PM-3:30 PM

Paper

   

No

Title

Authors

20

Contention Based Distributed Fair Scheduling Algorithm for Wireless LAN

Vinod Maid*, DBATU Lonere; Laxman Netak, DBATU Lonere vinod.maid@gmail.com; ldnetak@yahoo.com

The IEEE 802.11 standards for Wireless Local Area network (WLANs) has been adopted Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) as a standard for communication. The overhead introduced by the Collision Avoidance is that delays should be as small as possible. On the other hand, the protocol should keep the number of collisions to a minimum, even under the highest possible load. A lot of research has been made and is in progress to mitigate fairness issues arising with CSMA/CA. In this paper, we propose a Contention Based Distributed Fair Scheduling Algorithm for WLAN. This algorithm is based on CSMA/CA and guarantees low delays, reduced idle time, low collision rate and efficient collision resolution. Performance Analysis results shows that the proposed algorithm gives the better results than CSMA/CA.

22

Fuzzy based MANET Routing Protocol Security Model

Mukesh Krishnan*, Ganadipathy Tulsis Engg. mukesh_krishnan@yahoo.com

Ad Hoc Networks are a new generation of networks offering unrestricted mobility without any underlying

infrastructure. Primary applications of Ad Hoc networks are in military, tactical and other security sensitive operations, where the environment is hostile. Hence, security is a critical issue. Due to the nature of Ad Hoc networks, conventional security measures cannot be used. New techniques of security measures are essential for high survivability networks. In this paper we describe a new mobile ad hoc networks (MANET) routing protocol security design that combines authentication based security and IDS and to improve the performance fuzzy model is implemented. This make the MANET environment high secured with higher rate

of performance.

 
 

controlling overfitting in software quality

GOLI NAVEEN KUMAR*, ICAI,NEW DELHI

25

g_n1208@yahoo.com

A practical classification rule for a SQ (software quality) model considers the needs of the project to use a

model to guide targeting software RE (reliability enhancement) efforts, such as extra reviews early in development. Such a rule is often more useful than alternative rules. This paper discusses several classification rules for SQ models, and recommends a generalized classification rule, where the effectiveness and efficiency of the model for guiding software RE efforts can be explicitly considered. This is the first application of this rule to SQ modeling that we know of. Two case studies illustrate application of the generalized classification rule. A telecommunication-system case-study models membership in the class of fault-prone modules as a function of the number of interfaces to other modules. A military-system case- study models membership in the class of fault-prone modules as a function of a set of process metrics that depict the development history of a module. These case studies are examples where balanced

misclassification rates resulted in more useful and practical sq models than other classificatiion rules.

30

Modeling and Simulation of Embedded Software

MANASI PATIL*, C O E PANDHARPUR patil_manasi@rediffmail.com

ABSTRACT 1.1 Relevance : Advances in Electronics field have enabled the inexpensive fabrication of sophisticated products ranging from mobile phones and hi-fi equipment to highly complex software in cars and airplanes. Because embedded software is firmware and therefore difficult or impossible to replace, its correctness is of paramount importance. 1.2 Introduction : The applications such as mobile phone or remote control where the operator chooses between a small set of actions at any one point is typical of embedded application. If there are k choices in each step, after n steps there are kn different test sequences. If only a small fraction of the kn sequences leads to an error it is difficult to detect. Many of the times an unexpected combination of events led to a state that was neither anticipated nor tested; so Designers need techniques that allow them to exhaustively traverse the reachable state space. Proposed Work : A model is used which can be applied to any application where recording head movement is present; for example videocasette recorder, Floppy drive, CD drive, DVD This comprises three state machines: 1. MOTOR determines speed and direction of rotation. So possible states are stop (STOP), move forward (FW), move backward (BW). 2. POWER indicates whether power is on (ON) or off (OFF). 3. HEAD indicates whether the playing head is up (UP) or down (DOWN). The machines change state as reactions to the input events: ON, OFF, UP, DOWN, STOP, FW, BW. For all events except stop, at most one machine is reacting. HEAD can only be lowered once POWER is turned on. And in turn MOTOR can only move FW or BW if head is lowered. For the coding and synthesis of above state diagram appropriate modeling and simulation in C language is explained in paper.

31

Effects of averaging, shadow fading and hysteresis margin on handover performance

SANJAY DHAR ROY*, NIT, DURGAPUR s_dharroy@yahoo.com

Abstract: Effects of averaging, hysteresis margin and shadow fading are analyzed in a cellular mobile environment. Probability of outage and handover delay and average number of handovers are considered as performance metrics. Handover algorithm considered here is based on relative signal strength with hysteresis and absolute signal strength. Both analytical and simulation method have been used in this paper.

 

Survey of Network Performance Monitoring Tools- SNMP

Nagaraj G.S., RVCE, Bangalore

33

nagarajgs2000@yahoo.com

The growing dependence on networks for everyday tasks has created the demand for high performance, reliable networks. Part of achieving the goal of high performance is active monitoring of networks to help in the identification and prevention of network errors. Many tools have emerged to aid in performance monitoring of networks. The most common class of tools is based on the Simple Network Management Protocol (SNMP), a protocol for sending and transmitting network performance information on IP networks. Other types of network performance monitoring tools include packet sniffers, flow monitors and application monitors. Examples of the various monitoring tools are SolarWind's Orion SNMP monitoring platform, WireShark packet capture tool, Webmetrics' GlobalWatch and Cisco's NetFlow flow monitoring tools. development of numerous network performance monitoring tools and standards. The most common tools are network management system based on standardized network management protocols that give a comprehensive view of a network and all of its devices. Of course, there are other tools that are not as complex as a full network management system but equally useful for monitoring certain aspects of network

performance. This survey paper will cover the basics of network performance monitoring, standards for network management and different types of monitoring tools. It will conclude with a look at several different monitoring tools including commercial and open-source implementations.

 

Design of Low Voltage, Low Power Current Sense Amplifier for SRAM

Shruti Oza*, Institute of Technology, Nirma

36

swajan_2004@yahoo.com

Large bit-line capacitance is one of the main bottlenecks to the performance of on-chip caches. New sense amplifier techniques need to explicitly address this challenge. A low voltage, low power current sense amplifier for SRAM is proposed here. The proposed sense amplifier is designed using Cadence tool (tsmc 0.18 micron technology, 1.6V). The current sense amplifier uses a modified current conveyor to prevent the pattern dependent problem. The sense amplifier designed here can be used in memory units, as a line receiver and as a restoring element for small-swing logic. The sense amplifier senses the cell current directly and shows a speed improvement compare to the conventional voltage mode sense amplifier. The simulation results indicate that for the specified low voltage, the sense amplifier consumes less power & provides high speed.

 

A Time Table Generation Algorithm for Engineering Colleges

Venugopala PS*, NITK; James Lobo, NMAMIT; Ashwini B, NMAMIT venugopalaps@yahoo.com; james_s_lobo@yahoo.co.in;

37

ash_912@rediffmail.com

Timetable is the scheduling of events. In a college, it is the allotment of lecture hours and laboratory works to a class. The algorithm Time Table Generator aims at an automated package to generate the timetable for an engineering college. Every educational institute has to go through the process of creating an all new time table for all the classes at the beginning of academic year or semester. This process is very tedious and complex due to the various criteria that have to be taken care of, during the process of charting out the timetable. The Time Table Generator aims to automate the process and provides for the easy and organized viewing of the generated time table. This product takes as input, the class details, lecturer for each subject and the number of classes to be held per subject per week. It provides for an easy viewing of the time table which is generated dynamically for a class, and for a lecturer. The algorithm follows a table filling method to find the unfilled slot and assign the class considering the constraints.

46

Performance Analysis of Mobile Agents in Distributed systems

Mohammad shareef Shareef*, Jntu, ananthapur; Vasundara S, jntu, ananthapur mahmud_munna@rediffmail.com; vasundaras@rediffmail.com

Mobile Agents are used for remote control of distributed systems. Mobile agents are inherently distributed software entities that reduce the load on network when they move. Mobile agents are widely used in many areas for information retrieval, for modern distributed industrial system, such as a power transmission system, consists of many sites distributed throughout a wide area. Each site contains a number of monitoring and control devices, proposed work demonstrates the use of mobile agents for remote access to devices. Proposed work provides a comparison of performance of client server and mobile code for different data sizes and shows a number of performance improvements from using mobile agents. The main advantage of mobile agents over client server model is scalability and network performance will not degrade incase of network overload situation. Results suggest that for networks with high latency mobile agents may provide performance improvements over more conventional client server systems.

68

 

Hema Ajetrao*, Pad.Dr.D.Y.P.I.E.T,Pimpri

 

DATA HIDING IN MIDI FILES

hema_ajetrao@yahoo.com

MIDI files are kind of musical files which contain commands for musical performance. They are small in size and widely used over the internet. This article provides three methods or algorithms which can be used (and already are realized) to hide foreign data inside the MIDI container, or in other words, to use these files as containers for Steganography purposes.

72

Next Generation Internet Technology

Jagadish C*, Alcatel-Lucent Technologies ncjagadish@alcatel-lucent.com

Several problems are associated with today's Internet technology and this has given rise to Internet Technology Development. This paper provides an overview of Next Generation Internet Technology like Internet2 and the latest version of Internet Protocol IPV6.

85

Extending Autonomic Capabilities to a Campus Wide Grid

Inderveer Chana*, Thapar University, Patiala inderveer@tiet.ac.in

Grid computing has largely been recognized as the future paradigm of distributed computing. Grid is a collection of distributed and heterogeneous resources, which are open, shared, geographically distributed and heterogeneous in nature and aim to achieve high computational performance collaboratively. The manual management and administration of these complex systems is both erroneous and time consuming and to solve this problem Autonomic Computing can provide a requisite solution. This paper presents an Autonomic framework and a Campus Wide Grid architecture and focuses on the points at which introduction of the Autonomic capabilities to such a Grid can be extended.

 

Efficient Resource Discovery in Grid

Santosh Jaiswal*, Thaper university; Inderveer Chana, Thapar University, Patiala; Seema Bawa, thapar university santosh.jaiswal@tiet.ac.in; inderveer@tiet.ac.in; sbawa@tiet.ac.in

90

Environments: A Hybrid Approach

Grid is a promising technology for coordinated resource sharing and problem solving in dynamic virtual organization. The most challenging task in Grid environment is to manage numerous, heterogeneous and dynamic resources. Discovery of resources in such a complex environment is a tedious task. To make the process of resource discovery more efficient, Grid Resource Management requires an automatic Grid Resource Discovery approach. In this paper, we have discussed various Resource Discovery approaches and compared Syntax based Resource Discovery with Semantics based Resource Discovery. We have also discussed agent based and query based Resource Discovery. A Hybrid Approach of Resource Discovery, using ontology schema has been proposed in this paper.

92

Generalised Multi Protocol Label Switching Based Optical Networks

SANDEEP DABHADE*, WIPRO TECHNOLOGIES dabhade_s@rediffmail.com

Generalised Multi Protocol Label Switching is widely used in optical networks. GMPLS is extention of MPLS. The focus of this paper is on overview on GMPLS. The paper will also cover basics of SDH/SONET networks, MPLS.

101

Low Complexity Cell Search for Mobile OFDMA Systems

Murugesa Pandian*, Anna University; Srikanth Subramaniam, Anna University pamurugesapandian@gmail.com; sribommi@gmail.com

Abstract: In this paper, a low complexity cell search algorithm for mobile OFDMA systems is presented, with IEEE 802.16e as the example. We propose a method, to identify a dominant sector at the sector boundary, using common sync symbol. The information about the dominant sector reduces the complexity of cell search. Extensive simulation results show that the new technique using common sync symbol can achieve better performance than the conventional schemes for achieving initial timing acquisition, fractional frequency offset correction, integer frequency offset estimation and dominant sector identification.

108

Efficient Memory Management for Audio Codec Development on SHARC

Aleem Mohammad*, Analog Devices Pvt Ltd; Vijayalakshmi S, Analog Devices Pvt Ltd aleem.uddin@analog.com; vijaya.lakshmi@analog.com

The memory organization on SHARC® is broadly categorized either as internal or external. The absence of a data/code cache, overhead involved in accessing external memories, and in some cases inability to directly access external memory from DSP cores are some of the key issues encountered and the discussed technique is presented to overcome some of them. Evolving audio processing techniques are getting more and more complex and compuatation intensive. As a result the advanced algorithms are considered MIPS hungry and often too demanding on memory resources available on DSP. In some cases due to high MIPS reqirements, on-chip memory required for processing surpasses the capacity of the processor. As a result these complex algorithms then might be considered non-feasible to implement. The discussed technique in this paper is a means to overcome most of the limiting factors for such cases. This happens by providing a means of managing on-chip memory requirement dynamically in a more efficient manner.

 

A

Decentralized algorithm for Load Balancing

 

110

in

a Grid Environment

Ratnesh Nath*, TIET.Patiala ratnesh.nath@tiet.ac.in

Grid computing environment has many unique characteristics such as heterogeneous resources, considerable communication delay and dynamic network topology that make it different from the traditional distributed systems. These characteristics have a significant impact on the performance of load balancing. The efficient use of the Grid requires an approach to manage the heterogeneity of the involved resources that can include computers, data, network, etc. In this paper, we proposed a de-centralized and adaptive load balancing algorithm for heterogeneous Grid environment. Our algorithm estimates three system parameters: average processing time, heterogeneity and loads at processor and efficiently performs load balancing by considering all necessary criteria.

 

SMS BASED ADVANCED SECURITY SYSTEM

ABHISHEK RANE*, Nil

118

abhirane04@yahoo.co.in

THE AIM OF THE SYSTEM IS TO PROVIDE SECURITY TO THE USER'S OBJECTS BY MAKING USE OF THE SMS AS AN ALARM SIGNAL FOR THE USER.

 

A

New Generalized Architecture for Digital

JOYANTA BASU*, WBUT,SALT LAKE,KOLKATA; Md. Sahidullah, WBUT

122

Signal Processor

   

wbut.dsp@gmail.com; sahi.cse@gmail.com

Sophisticated digital signal processing application needs faster and precise result as well as in low hardware cost i.e. silicon area. Search for common architecture for different DSP operation is an intention for long days to the signal processing engineers & scientists. This paper presents a high performance; flexible architecture for digital signal processing that gives precise output in a short time and also had a flavor of reconfigurability. The main objective is to make the basic elements like adder, subtractor, and multiplier are static but the interconnection between them is reconfigurable so that we get different transform result from a preset architecture. In this architecture there is provision of downloading bit stream into the System-on-chip (SOC) from the outside of the device. By this proposed design different DSP operations can be performed by changing the modes of the Interconnection Network (ICN) and the contents of Control Memory.

140

Indirect Path Setup Handoff Scheme (IPSH) For HAWAII Micro-Mobility Protocol

Fekri Abduljalil*, University of Pune; Shrikant Bodhe, Pune University fmabduljalil@gmail.com; s_k_bodhe@indiatimes.com

Fast Handoff is an important factor for designing an efficient IP micro-mobility protocol, where frequent handoff and handoff delay cause a service disruption especially for real time applications. In this paper, a new approach for fast path setup handoff in the Handoff-Aware Wireless Access Internet Infrastructure (HAWAII) micro-mobility protocol is proposed to decrease the handoff delay and packet loss in order to support the real time and none real time Internet applications. It is called indirect path setup handoff scheme (IPHS). The idea is that this scheme can establish the path to the new base station before the actual handoff, and it can signal exact handoff initiation time to a mobile host to switch to a new base station using the indicator message of the last packet (IMLP), also it uses buffer in the new base station to save the incoming packet and prevent any packet loss. The simulation results show that the number of packet loss is zero, and the handoff time and service disruption time are very small. So, this handoff algorithm has better performance than the other HAWAII path setup schemes, and it can efficiently support real-time and non- real time applications.

141

Numerical Analysis of Different Broadcast Schemes for Multi-hop Sensor Networks

Saurabh Mehta*, University saurabh.mehta@hotmail.com

In this paper, we present the performance of different broadcast schemes for multihop sensor networks using mathematical modeling. In near future many applications will demand multicast (Broadcast) communication feature from the sensor networks. This broadcast feature does not use virtual carrier sensing but relies on physical carrier sensing to reduce collision. For this paper, we analyze the different broadcast schemes for multihop sensor networks and also calculated the achievable throughput.

 

A High Throughput VLSI Design of Advanced Encryption Standard for Wireless LAN

SIVA KUMAR*, ANNA UNIVERSITY(M.I.T)

152

siva_81ece@yahoo.com

The IEEE Standard 802.11 introduced Wired Equivalent Privacy (WEP) Protocol for Wireless Local Area Network (WLAN). WEP utilizes the RC-4 Encryption algorithm, which is very weak against attacks and it doesn’t provide high security. Therefore the IEEE 802.11 should use Advanced Encryption Standard – Counter with Cipher Block Chaining-Message Authentication Code Protocol (AES-CCMP). In this paper, we propose a high speed, non-pipelined FPGA implementation of the AES-CCMP cipher for wireless LAN using Xilinx development tools and Virtex-II Pro FPGA circuits. IEEE 802.11i defines the AES-based cipher system, which is operated on CCMP Mode. All the modules in this core are described by using Verilog 2001

language. The developed AES CCMP core is aimed at providing high speed with sufficient security. The encryption/decryption data path operates at 194/148MHz resulting in a throughput of 2.257 Gbits/sec for the encryption and 1.722 Gbits/sec for decryption. Compared to software implementation, migrating to hardware provides higher level of security and faster encryption speed. A comparison is provided between our design and similar existing implementations.

 

Improvement of Naturalness and Emotion of Speech through Speech Synthesis

Anupam Nayek*, GGS Indraprastha University; Anurag Jain, Lecturer, GGS IP University anayek@gmail.com;

159

anurag_jain76@yahoo.com

Speech is the key for communication between human. From the last few decades speech synthesis is becoming the most important technique for the communication purpose for the visual handicapped people. Every Text to Speech synthesis system has its own implementation, but the basic steps to implement a TTS synthesizer are somewhat same. After generation the pronunciation the most vital and complex part of TTS system i.e. prosody/emotion generation can be done. Prosody is basically a combination of intonation, duration, pitch etc. The primary goals of speech synthesis are to produce speech with high intelligibility and also with high quality of sound and naturalness. At present era the first parameter of goal has been reached, but the naturalness and quality are the still major problem. To avoid these problems, focus is given on the design techniques on acquiring phrasing rules automatically by using samples of data that requires large prosodically labeled segments to find out the segmental duration of each speech segment (or syllable) by rigorous training procedure. This segmental duration helps to acquire the phrasing rules which implement the naturalness of speech. And then to implement the prosodic part for controlling the emotion we are developing a Tone and Break Indices framework for Indian Languages. To develop this framework we are using PRAAT software for analyzing the variation of signal (Intensity and Pitch) for different emotion using same utterance. These signals help to label the Tone, Break Indices (Acoustic segment pattern), Boundary tones and prominence, which are used to generate the emotion of speech at runtime. Hence this total procedure produces high quality of speech with naturalness and proper emotion.

175

Honey Pot Enabled Intrusion Detection System (HPEIDS)

Saikat Saha*, GGSIPU,Delhi saikat_mnnit@yahoo.co.in

Intrusion detection system (IDS) is the process of monitoring computers or networks for unauthorized entrance, activity, or file modification. It is hardly difficult to provide secure information systems and to maintain them in such a secure state in their lifetime and utilization as everyday intruders have been increasing whether it was inside or outside. This paper first presents a thorough survey on the field of network intrusion detection and a classification of the systems according to the survey. The most common shortcomings in the existing intrusion detection systems are unknown attacks, false positives and false negatives. We present the design of HPEIDS (Honey Pot Enabled Intrusion Detection System) which solves the problems previously mentioned. Using honey pot with IDS also increases the flexibility and security of IDS. We also present the definition of the honey pot along with the Multi-level log mechanism.

ICEMC2 2007 Organizing Committee

Chief Patrons:

Ramesh Babu

M.R. Doreswamy, Founder-Chairman, PES Institutions,

C.V. Srikrishna

India

R. Chandrashekar

D. Jawahar, Director, PES Institutions, India

S. Natarajan

Sreekanta Murthy

Patron:

A. Srinivas

K.N. Balasubramanya Murthy, PESIT, India

G.D. Murthy

principal@pes.edu

Chidambara

General Chair:

Technical Program Co-Chairs:

Suthikshn Kumar, Director-MCNC, PESIT, India, suthikshn.kumar@pes.edu

Jens Harnisch, Infineon Technologies, Germany, Asoke Talkder, IIITB, India,

Honorary Co-chairs:

Hosahalli R Srinivas, Broadcom Corporation, USA, Narasimha Prabhu, Global Edge S/w Ltd, India

Mukesh Taneja, Freescale Semiconductors, India Srinivas Sampalli, Dalhousie University, Canada

International Publicity Co-chairs:

Paul Jeong, L&T Infotech, India Nalin Sharda, Victoria University(Australia), Purnendu Sinha, Philips Research, India J. Suryaprasad, PESSE, India

Srinivas Mukkamala, New Mexico Tech, USA Ravi Mittal, Flextronics Software, India Narendranath Udupa, Philips Software, India

National Advisory Committe Co-chairs:

Conference Advisory Committee:

C.P Ravikumar, Texas Instruments India,

R.

H.P. Khincha, Indian Institute of Science, India

Natarajan, AICTE, India

Laxmidhar Behera, IIT Kanpur ( India) Dipti Deodhare, CAIR, India,

Siva Ram Murthy, IIT, Chennai, India

R.

Srinath, DACS S/w Pvt Ltd, India

P.N. Rangarajan, Indian Institute of Science, India

R.

Srinivasan, RNSIT, India

K.G. Rangaraju, Former Dy Director, IIT Roorkee, India Chandar Sundaram, Microsoft, India

Y.J. Rao, L&T Infotech, India T.V. Srinivas, IISc, India

M.P. Chowdiah M.G. Venkatesh Murthy, MCE, Hassan, India

International Advisory Committee Co-Chairs:

Local Organizing Committee at PESIT, India:

Anil Kumar Thakoor, NASA, USA P.R. Kumar, University of Illinois, USA

S.S. Shylaja

Tirumale K Ramesh, Boeing, USA

T.R. Seetharam,

M.

Palaniswami, Univeristy of Melbourne, Australia

R. Nargundkar,

Wing Cmdr Shridhara Nitin V. Pujari Kris Kumar Kavi Mahesh

International Sponsorship Chairs:

Savitri Bevinakoppa, RMIT University, Australia, Ganga Prasad, C-DAC, India Pradeep Desai, TCS, India

ICEMC 2 2007 Co-sponsors

:

C-DAC, India Pradeep Desai, TCS, India ICEMC 2 2007 Co-sponsors : Version 1.0, Last Modified 4-7-2007
C-DAC, India Pradeep Desai, TCS, India ICEMC 2 2007 Co-sponsors : Version 1.0, Last Modified 4-7-2007
C-DAC, India Pradeep Desai, TCS, India ICEMC 2 2007 Co-sponsors : Version 1.0, Last Modified 4-7-2007

Version 1.0, Last Modified 4-7-2007 Edited:SK