Beruflich Dokumente
Kultur Dokumente
of
B.Tech. Project Reports
Batch - 2006-10
Abstracts
Resource Centre
DA-IICT
Gandhinagar - 382007
Introduction
The Resource Centre team is happy to bring out this catalogue listing B. Tech. Projects,
submitted by the 2006-2010 batch students to the Institute. This document covers in all 141
projects submitted by 2006-10 batch students and are listed in alphabetical order under each
year by student’s surname. Each entry of the project provides the bibliographical details, such
as author (with ID number), title, page numbers, year of submission, supervisor name, call
number, accession number, keywords and abstracts. At the end, author and supervisor
indexes have been provided to enable the user to locate a specific entry in this catalogue.
Hope you will find this document useful. We would be happy to have your comments and
suggestions, if any, to improve this catalogue further.
i
Contents
Batch - 2006-2010
1. Hardware Approaches to System Security 1
By Animesh Agarwal
By Ankit Agarwal
By Rohit Agarwal
By Sweta Agarwal
By Ankit Agrawal
By Shruti Agrawal
By Sudhanshu Agrawal
By Vinay Agrawal
By Akshun Kumar
By Anudeep C.
ii
15. ImageCense: Improving Image Communication Efficiency and Data Rate 4
By U. L. N.Bhargav
By Manisha Biyani
Markets
By Kushal Bhola and Rishi Josan
By Anshul Chaurasia
By Smit Choudhary
26. Extending CAN clusters using IEEE 802.11b standard for industrial communication 7
By Dhruv Dani
By Harsh Dhulia
29. Implementation of Pmipv6 in Ns2 8
iii
30. Emulator Based Approach for Functional Verification 8
By Dorav Kumar
By Prashant P.Dutta
32. Power and Overflow Optimization of Wireless Sensor nodes Using Queueing Models 9
By Khushal Garg
By Prateek Goyal
36. Speaker Recognition from Their Hum and QBH (Query by Humming) 10
37. Embedded System Design for fuel measurement and tracking Vehicles 10
By Jayesh Gumber
38. Image Processing for the Quality Assessment of food grains using Parallel Programming 10
By Mradul Gupta
By Sanchit Gupta
43. IR Text Collection in Punjabi 11
By Saurabh Gupta
44. RFC 1981 (IPv6 Path MTU Discovery) Compliance in Mobile Phone’s Data Service Protocol 12
Stack
By Setu Gupta
45. Information Extraction with Logic Programming 12
By Sumit Gupta
iv
46. PAPR Comparison between different multiple carrier FDMAs 12
By Ansu Jain
By Prateek Jain
By Rachit Jain
51. Proxy Re-Signature 13
52. A Simple Protocol for Computing Aggregation Function Min/Max in Wireless Sensor Nodes 14
By Sneha Jain
53. Security Analysis of Two Handover Authentication Protocols Using Protocol Composition 14
Logic
By Aanchal Jindal
By Shobhit Jain
55. Characterization and Thermal Resistance Estimation of AlGaN/GaN based High Electron 14
Mobility Transistors
By Tanu Jindal
56. Self Assertive Device for Helping People with Cerebral Palsy 15
By Hitesh Kamra
58. Game Theory In Stock Exchange 15
By Kavita
By Manish Khandelwal
By Bharath Kolli
v
61. System Dynamical Modeling of Role of Microfinance in Poverty Alleviation 16
By Ramakrishna Konda
63. Study of Fujito’s 2- Approximation Algorithm for Minimum Cost Tree Cover 17
67. Phone Book Manager: Overview and Optimizations on Code and Memory Usage 18
By Ankit Maheshwari
68. Architecture Design of a Processor for Biomedical Applications and Investigation of Latest Full 18
Adder Topologies
By Mohit Maheshwari, and Prashant Garg
69. Dual Band Circularly Polarized Microstrip Patch Antennas For RFID Reader 18
70. Security Proofs for Hierarchical Key Assignment Schemes With Dependent Keys 19
By Murali Medisetty
By Pranjal Mishra
By Mulagalapati, Murali
75. Cryptanalysis and Improvement of Protocols Integrating Diffie-Hellman Key Exchange into 20
vi
By Vivek Munagala
By Kartik Nagar
78. Implementation of LC - 3 as Three Stages Pipelined and Three Sstage Super Scalar Pipelined 21
Processor in Verilog
By Naveen Narang
By Mounika Nukala
Segmentation
By Shaifali Parashar
By Raviraj Parihar
By Ankit Parwal
By Ankur Patankar
89. Study of Ant Colony Based Algorithm For Routing in Mobile Ad Hoc Network 24
vii
90. Subband Adaptive Filtering in Frequency Domain and Coefficient Decimation Filter bank 24
By Gowtham Potru
By Mayank Prabhakar
By N. V. Raghuveer
By Vishal Raj
By Raunak
By Anvesh Rayankula
101. Developing Dashboard and Analytics Frame Work for Digital Green System 27
By Sreenivasula Reddy, G.
103. Analysis on Overhead Reduction Schemes of Signaling CQI Feedback in LTE Systems 27
viii
105. To Compute The Continued Fraction of Logba Following Shank’s Algorithm 28
By Hitesh Sabnani
108. Rumor Spreading (via Mobile) in Social Networks 28
By Rakesh Salecha
By K. SaiSwaroop
By Dhruv Shah
113. A Self-Healing and Mutual-Healing Key Distribution Scheme for Wireless Networks 29
By Prasann Shah
By Anshul Sharma
By Shashi Kumar
ix
By Vaibhav Shrimali
By Abhinav Singh
By Arjun Singha,
By Rahul Sirohi
By Utkarsh Srivastava
By Vishal Somani
By Prakash C. Sukhwal
129. Simulation of Traveling Salesman Problem Using Markov Chain Monte Carlo Method 33
By Swarnika
By Vaibhav Temani
x
136. Finding Smallest H-Subgraph in Real Weighted Graphs 35
By Ishan Vashistha
By D. Venkatesh
By Pallav Vyas
By V. Harish Vyas
Author Index 37
Supervisor Index 39
xi
Resource Centre, DA-IICT B.Tech. Projects 2010
B. Tech Projects
(Abstracts)
2006-2010
1
Resource Centre, DA-IICT B.Tech. Projects 2010
2
Resource Centre, DA-IICT B.Tech. Projects 2010
technologies (working on different frequencies) through a single device. The answer is multiband
fractal technology. In this work, some examples of fractal microstrip antenna and multifractal cantor
antenna have been analyzed, based on which a novel multiband fractal antenna has been proposed,
which is designed for RF-ID and WiMAX applications, with a costeffective substrate. The
measured antenna parameters are presented to validate the proposed antenna.
3
Resource Centre, DA-IICT B.Tech. Projects 2010
4
Resource Centre, DA-IICT B.Tech. Projects 2010
is aimed at removing meaningless changes caused by camera motion and followed by subsequent
steps, motion segmentation is done. Graph theoretic approaches have been widely used for
performing segmentation. In this report we have studied one such interesting graphical method
using Ncut.
5
Resource Centre, DA-IICT B.Tech. Projects 2010
6
Resource Centre, DA-IICT B.Tech. Projects 2010
7
Resource Centre, DA-IICT B.Tech. Projects 2010
India Research Portal (IRP) is a subsystem of IKP which is focused on catering to the needs of the
Indian research community.
In this paper, the advantages of PMIPv6 protocol are verified by implementing it in NS2 and
comparing its performance in 802.11 environments with MIPv6.
8
Resource Centre, DA-IICT B.Tech. Projects 2010
9
Resource Centre, DA-IICT B.Tech. Projects 2010
10
Resource Centre, DA-IICT B.Tech. Projects 2010
11
Resource Centre, DA-IICT B.Tech. Projects 2010
have built a standard IR text collection for Punjabi according to TREC1 specifications, which will in
turn improve the quality of research in the field of Punjabi information retrieval. This is the first
attempt at building a test collection for Punjabi language. I have also developed a stemmer and a
stopword list for Punjabi language..
12
Resource Centre, DA-IICT B.Tech. Projects 2010
iPhone.
Author: Jain, Ashwin (200601001), Hari, C. (200601046), and Pandey, Saket (200601122)
Title: Zipher: A Context-Aware Game for Mobile Phones Over Bluetooth; 11 p; 2010.
Supervisor: Srivastava, Sanjay
Keywords: Pervasive gaming; Ubiquitous computing; Java; Bluetooth; J2ME; Middleware
Abstract: Pervasive Gaming is an alternative form of gaming that attempts to bring the real back into the
virtual worlds by making use of the principles of pervasive computing. However, most of the
underlying software used in experimental games is not reusable as it is very specific to the
application and the platform. We have developed a prototype game called Zipher that aims to bring
pervasive gaming to an easily available platform and also provide an architecture for the future
development of pervasive applications on such platforms.
13
Resource Centre, DA-IICT B.Tech. Projects 2010
and the proposed re-signature algorithm are indistinguishable. It is very useful tool for sharing web
certificates, forming group signature, authenticating work path.
14
Resource Centre, DA-IICT B.Tech. Projects 2010
estimation of thermal resistance and channel temperature is highly desirable. In this study, reported
closed form expressions are used for estimating the thermal resistance of 0:25m gate AlGaN/GaN
HEMTS through simulation and its variation with geometrical parameters for dierent substrates,
e.g., Sic, Sapphire, Si, GaN and Diamond. In this project, simulation is carried out in MATLAB
R2008b to predict the thermal behavior of AlGaN/GaN HEMTs with industry standard
geometrical parameters.
15
Resource Centre, DA-IICT B.Tech. Projects 2010
16
Resource Centre, DA-IICT B.Tech. Projects 2010
17
Resource Centre, DA-IICT B.Tech. Projects 2010
18
Resource Centre, DA-IICT B.Tech. Projects 2010
directivity of 1st antenna is nearly 4.55 dB and 7.42 dB at 955 MHz and 2.44 GHz respectively. For
2nd antenna, directivity at 2.44 GHz and 5.8 GHz is 7.47 and 5.77 respectively.
19
Resource Centre, DA-IICT B.Tech. Projects 2010
proceedings of SIGGRAPH 2000, New Orleans. The goals and applications of inpainting vary from
restoration of damaged paintings and photographs to removal of selected object. In this paper, I
tried implementing an algorithm introduced by Bertalmio and Sapiro. After the user selects the
regions to be restored, the algorithm automatically fills-in these regions with information
surrounding them. The advantage of this paper over previous papers is that, users need not specify
where the novel information comes from. This is automatically done, thereby allowing to
simultaneously fill-in numerous regions containing completely different structures and surrounding
backgrounds. Some good applications of this technique include removal of superimposed text like
dates, subtitles, and the removal of objects like support cables, wires etc.
20
Resource Centre, DA-IICT B.Tech. Projects 2010
21
Resource Centre, DA-IICT B.Tech. Projects 2010
22
Resource Centre, DA-IICT B.Tech. Projects 2010
23
Resource Centre, DA-IICT B.Tech. Projects 2010
24
Resource Centre, DA-IICT B.Tech. Projects 2010
threaded program. In this work, we conduct a systematic measurement of the influence of various
software techniques for improving data locality on different parallel multi-threaded program based
on major parallel programming models. The main software techniques we used were loop tiling,
processor affinity and cache-sharing aware program transformations. From these measurements we
were able to indentify which class of programs can be improved by which techniques. We were also
able to identify some reasons behind such observations.
25
Resource Centre, DA-IICT B.Tech. Projects 2010
Through this widget the non-internet user can search for jobs or candidates on their mobile phone
with GPRS enabled handset or even on the television with the internet connection.
26
Resource Centre, DA-IICT B.Tech. Projects 2010
27
Resource Centre, DA-IICT B.Tech. Projects 2010
28
Resource Centre, DA-IICT B.Tech. Projects 2010
phone (target/FFA) and retrieving the logs from the phone((target/FFA) and displaying it in a user
friendly format.
29
Resource Centre, DA-IICT B.Tech. Projects 2010
30
Resource Centre, DA-IICT B.Tech. Projects 2010
Author: Shiva Rama Krishna, I. (200601103) and Kethireddy, Sudheer Kumar (200601172)
Title: Performance Analysis of Jiaxin Wang, Tarjan and Szwarcfiter Algorithms; 5 p.; 2010.
Supervisor: Chatterji, Samaresh
Keywords: Cycle; Directed graph; Open path; Backtracking stack; Queue; Adjacency matrix, Position vector,
Boolean vector; Elementary path; Elementary cycle.
Abstract: Numerous algorithms have been proposed for enumeration of cycles in a Di-graph. Three standard
algorithms proposed by Swzarcfiter and Lauren, Jiaxin Wang and Hongbo Liu and Tarjan
respectively have been implemented and their performance is evaluated by a simulation study.
31
Resource Centre, DA-IICT B.Tech. Projects 2010
32
Resource Centre, DA-IICT B.Tech. Projects 2010
33
Resource Centre, DA-IICT B.Tech. Projects 2010
We have been able to identify two different categories of false attacks generated by Scyther, the
automated protocol checker developed by Dr. Cremers. This paper also describes the input and
outputs of the automated detection of false attacks framework (see figure 5). We have endeavoured
to formalize the identification of false attacks and in the process we have developed an automated
tool for the same. This work also forms a part of an autonomic framework (figure 1) and serves to
validate the attacks generated by the automated protocol checker.
34
Resource Centre, DA-IICT B.Tech. Projects 2010
35
Resource Centre, DA-IICT B.Tech. Projects 2010
36
Author Index
50
Author Index
51
Supervisor Index
Banerjee, Asim, 04, 07, 08, 12, 14, 16, 18, 28, 30, 34
Bhise, Minal, 13, 23, 27, 32, 33
Chakka, Vijaykumar, 07, 08, 12, 24, 27
Chatterji, Samaresh, 04, 05, 10, 11, 15, 16, 17, 23, 24, 25, 26, 28, 31, 32, 35, 36
Chaudhary, Sanjay, 02, 03, 05, 06, 07, 10, 11, 15, 16, 18, 20, 21, 22, 23, 24, 25, 26, 27, 30, 33, 36
Das, Manik Lal, 02, 03, 04, 06, 13, 29, 33
Desai, Binita, 06, 13, 31, 35
Divakaran, Srikrishnan, 02, 07, 08, 19, 34
Dubey, Rahul, 08, 09, 10, 21, 25, 30, 34
Ghodgaonkar, Deepak, 03, 18, 30
Gupta, Manish K., 04
Gupta, Sanjeev, 01, 02
Jat, P .M., 01, 09, 23, 26, 28, 29
Joshi, Manjunath V., 19, 27
Majumder, Prasenjit, 11, 22, 28
Mathuria, Anish M., 01, 19, 20, 29, 31, 32, 34, 36
Mitra, Suman K., 22
Mulherkar, Jaideep, 09, 33
Muthu, Rahul, 02, 19, 25
Nagchoudhuri, Dipnkar, 18
Pandya, Abhinay, 12
Parikh, Chetan D., 32
Patil, Hemant, 10, 17, 29
Ranjan, Prabhat, 04, 12, 15, 17, 21
Raut, Manoj, 05
Raval, Mehul, 03, 10
Roy, Anil K., 02, 14, 36
Sethuraman, S., 11
Srivastava, Sanjay, 13, 19, 35
39
Supervisor Index
Banerjee, Asim, 04, 07, 08, 12, 14, 16, 18, 28, 30, 34
Bhise, Minal, 13, 23, 27, 32, 33
Chakka, Vijaykumar, 07, 08, 12, 24, 27
Chatterji, Samaresh, 04, 05, 10, 11, 15, 16, 17, 23, 24, 25, 26, 28, 31, 32, 35, 36
Chaudhary, Sanjay, 02, 03, 05, 06, 07, 10, 11, 15, 16, 18, 20, 21, 22, 23, 24, 25, 26, 27, 30, 33, 36
Das, Manik Lal, 02, 03, 04, 06, 13, 29, 33
Desai, Binita, 06, 13, 31, 35
Divakaran, Srikrishnan, 02, 07, 08, 19, 34
Dubey, Rahul, 08, 09, 10, 21, 25, 30, 34
Ghodgaonkar, Deepak, 03, 18, 30
Gupta, Manish K., 04
Gupta, Sanjeev, 01, 02
Jat, P .M., 01, 09, 23, 26, 28, 29
Joshi, Manjunath V., 19, 27
Majumder, Prasenjit, 11, 22, 28
Mathuria, Anish M., 01, 19, 20, 29, 31, 32, 34, 36
Mitra, Suman K., 22
Mulherkar, Jaideep, 09, 33
Muthu, Rahul, 02, 19, 25
Nagchoudhuri, Dipnkar, 18
Pandya, Abhinay, 12
Parikh, Chetan D., 32
Patil, Hemant, 10, 17, 29
Ranjan, Prabhat, 04, 12, 15, 17, 21
Raut, Manoj, 05
Raval, Mehul, 03, 10
Roy, Anil K., 02, 14, 36
Sethuraman, S., 11
Srivastava, Sanjay, 13, 19, 35
39
Resource Centre
DA-IICT
Near Indroda Circle
Gandhinagar - 382007
Phone: 079-30510578
E-mail: rcservices@daiict.ac.in