APSCHE - IJPAPERijpaper.com/wp-content/uploads/2013/03/CSEA_Souvenir.pdfSri Padmavati Mahila...
Transcript of APSCHE - IJPAPERijpaper.com/wp-content/uploads/2013/03/CSEA_Souvenir.pdfSri Padmavati Mahila...
APSCHE
Sponsored
NATIONAL CONFERENCE ON
COMPUTER SCIENCE, ENGINEERING AND
APPLICATIONS
CSEA – 2012
9th & 10th November, 2012
Organised by
DEPARTMENT OF COMPUTER SCIENCE
SRI PADMAVATI MAHILA VISVAVIDYALAYAM
(Women’s University)
TIRUPATI – 517502
ANDHRA PRADESH, INDIA
www.spmvv.ac.in
Dr. M. Usha Rani Convener
Chief Patron – Prof. S. Rathna Kumari
Vice Chancellor
Patron –Prof. E. Manjuvani
Registrar
Organizing Committee
Prof. K. Sandhya Rani M.Sc., PGDCA, M.Tech., Ph.D.
Prof. S. Jyothi M.Sc, M.S., Ph.D.
Dr. M. Usha Rani M.C.A., Ph.D.
Dr. K. Usha Rani M.Sc., B.Ed., M.C.A., Ph.D.
Technical Committee
M. Sirish Kumar M.C.A.
P. Gowthami M.C.A.
S. Munilakshmi M.C.A.
E. Durga Priya Darshini M.C.A.
T. D. Gopi M.C.A.
B. Lavanya M.C.A.
T. Kavya B.Sc., D.C.A.
PREFACE
National Conference on Computer Science, Engineering and Applications is the right venue to
mix the science along with the industrial needs. Computer Science and Engineering is an
emerging and promising discipline in shaping the future research and development activities in
both academic and industry in the fields ranging from engineering, science, finance and
humanities. Conference on Computer Science, Engineering and Applications looks for
significant contributions from researchers for sharing knowledge and results in theory,
methodology and applications of Computer Science. This conference will be an excellent
national forum which will provide great opportunity for the teachers, scientists, engineers,
researchers, scholars and students to exchange new ideas in all aspects of the research fields.
This national conference consists of 8 Technical sessions included with 8 plenary
speeches. About 125 papers were received from all over India, 90 were selected for presentation
and 56 were accepted for inclusion in the proceedings after a rigorous peer review by organizing
committee. We congratulate all authors of those manuscripts that have been accepted, and
request authors of manuscripts that could not be included in the proceedings to bear with our
difficulty in not being to accept them.
The presentations were organized under 18 specializations which are as follows:
Algorithms and Bioinformatics
Computer Architecture & Real time Systems
Computer Graphics & Vision
Cryptography & Network Security
Database Systems & Data Mining
Dependable, Reliable and Autonomic
Computing
Digital Watermarking and Steganography
Distributed and Parallel Systems &
Algorithms
Embedded System and Software
Geographical Information Systems
Global Navigation Satellite Systems
Grid and Scalable Computing
Image Processing/Pattern
Recognition/Multimedia
Mobile and Ubiquitous Computing
Natural Language Processing &
Machine Learning
Networking and Communications
Soft Computing
Software Engineering
We would like to thank all the authors for their interest in CSEA-2012. We are grateful to
Vice-Chancellor Prof. S. Rathna Kumari for her constant encouragement and support. We also
thank Registrar Prof. E. Manjuvani, Dean of Sciences - Prof. D. Bharathi, Prof. K. Sandhya
Rani, Prof. T. Sudha, Prof. S. Jyothi and Dr. K. Usha Rani for their support in organizing the
conference. We sincerely acknowledge the financial assistance from APSCHE. Also,
acknowledge must be made of the support provided by faculty, research scholars and students,
too numerous to mention individually, who worked so diligently on various aspects of the
conference. We thank all the teaching and non-teaching staff members, research scholars and
students of the Department of Computer Science, Sri Padmavati Mahila Visvavidyalayam,
Tirupati who have helped us in organizing this conference and in compilation and editing of the
proceedings.
Convener
Dr. M. Usha Rani
PROFILE OF THE UNIVERSITY
Sri Padmavati Mahila Visvavidyalayam (University for Women) is the only institution of
higher learning in Andhra Pradesh devoted exclusively to women‟s education. The University
was started in year 1983 with the avowed objective of giving professional education to women in
AP and making them self reliant. Further the University was established with conviction that
emancipation and empowerment of women can be achieved only through education. The mission
of the university as depicted in its emblem is Emancipation of Women through Acquisition of
Knowledge. To this end the University offers courses which serve the dual purpose of academic
excellence with applied orientation.
The goals of the University are
To be a change agent in transforming the status of women from a minority to majority by
its role and power sharing.
To expand the horizons of knowledge by education, research and consultancy.
To propagate knowledge through conferences and publications.
To improve the quality of life of people and organizations in the society through
extension work and consultancy.
To strengthen and promote organizations that serve the interest of women through
networking and collaborations.
The campus of SPMVV is spread over in lush green area of 138.43 acres. The campus
has serene atmosphere and provides the right ambience for student learning. The University is
situated at a distance of 3 km from the railway and bus stations of Tirupati.
The University campus encompasses the Humanities, Science and Engineering Schools
Headed by a Dean, hostels for students, Staff Quarters, Computer Centre, Sericulture Farm,
Indoor Stadium, Library Buildings and Health Centre. In tune with the objectives, the University
is offering many courses that are job-oriented, professional and applied in nature. However,
keeping in view the need to have some basic courses that could be complementary to the applied
courses, the University is now launching new courses of basic nature.
The courses are so designed as to bring about application potential among students. The
instruction covers classroom teaching, laboratory and fieldwork. The learning environment
involves both live and simulated experiences. This University is distinct from the other
traditional Universities, in that it lays great emphasis on the value of extension as the third
dimension on par with the other two dimensions viz., teaching and research. Community service
is integrated into the curriculum by giving 20% weight age in the final grading for the degrees
(for instances, legal aid, nutrition education to the community, development of women and
children in rural areas, etc.). All the professional courses are monitored by national level bodies
such as National Council for Teacher Education (NCTE), All India Council for Technical
Education (AICTE), Bar Council of India and Pharmacy Council of India etc.
DEPARTMENT OF COMPUTER SCINCE: A PROFILE
The field of Computer Science has excellent employment potential in the present
explosion of technological development. The Department of Computer Science was established
in the year 1983 and offering 3 years Master of Computer Applications course since 1987. At
present department offers MCA programme following Choice Based Credit System in semester
pattern and research programmes: M.Phil. and Ph.D. The department has highly qualified and
eminent senior faculty members. The department of Computer Science is having e-class room
and computer lab with more than 80 high configured computers & latest software connected with
LAN facility.
Training at postgraduate level in Computer Science offers immense scope for
opportunities in software development and information technology. Employment opportunities
through campus interviews are provided to the students. The department is providing text books,
MCA, M.Phil., Ph.D. dissertations through departmental library. IEEE journals can be accessed
through digital library facility in the department. Active research is being done in the department
through M.Phil. and Ph.D. programmes. Number of scholars enrolled at present in the
department is 44. Number of Ph.D.s awarded during last 5 years is 20. The department has
conducted four National conferences, one international conference and the faculty have attended
many workshops and presented more than 250 papers at National and International conferences
and published number of articles in reputed journals. The department actively involved in
research in the areas like Artificial Intelligence, Data Mining, Neural Networks, Fuzzy Systems,
Genetic Algorithms, Computer Networks, Network Security, Parallel Processing, Image
Processing, Pattern Recognition, Bio-Computing, Bio Informatics and GIS.
Prof. S. Rathna Kumari Vice Chancellor Sri Padmavati Mahila Visvavidyalayam (Women’s University) Tirupati.
MESSAGE
I am happy to know that Department of Computer Science is organizing a National Conference on
Computer Science, Engineering and Application (CSEA-2012) on November 9th & 10th, 2012, in Sri
Padmavati Mahila Visvavidyalayam, Tirupati funded by APSCHE.
I am confident that, this conference will be an excellent national forum which will
provide great opportunity for the teachers, scientists, engineers, researchers, scholars and
students to exchange new ideas in all aspects of the advanced computer science fields like Soft
computing, Data mining, Pattern recognition, Bio-informatics, Grid & Cloud computing,
Steganography etc.
I am confident that the deliberations of the conference would be beneficial to the
researchers and academic in different parts of the nation who are attending this event.
I congratulate the department for organizing this National Conference and I wish all
success.
Prof. S. Ratna Kumari
Prof. E. Manjuvani, M.Sc., M.Phil., Ph.D. Registrar Sri Padmavati Mahila Visvavidyalayam (Women’s University) Tirupati.
MESSAGE
It is pleasure to know that the Department of Computer Science, Sri Padmavati Mahila
Visvavidyalayam, is organizing National Conference on Computer Science, Engineering and
Application (CSEA-2012) on November 9th
& 10th, 2012, in Sri Padmavati Mahila
Visvavidyalayam, Tirupati funded by APSCHE.
In this era of globalization and high competitions, Computers and its applications have
emerged in the forefront of every field of life. The national conference would serve as a forum to
know the challenges associated in this frontier and provide the directive for future research. In
the present scenario the theme of the conference is relevant to meet the present day needs and I
wish the delegates all the success. I congratulate the staff, research scholars and students of the
computer science department in organizing the conference.
Prof. E. Manjuvani
Prof. D. Bharathi
Dean, School of Sciences
Sri Padmavati Mahila Visvavidyalayam
(Women‟s University)
Tirupati – 517502.
MESSAGE
I am very glad to know that the Department of Computer Science is organizing a
National Conference on Computer Science, Engineering and Application (CSEA-2012) on
November 9th
& 10th, 2012, in Sri Padmavati Mahila Visvavidyalayam, Tirupati.
This conference provides an opportunity for the researchers and budding IT professionals
to know the innovative, intelligent and challenging aspects in IT. The conference gives a
comprehensive knowledge to the participants in the emerging field of Computer science and its
applications. The exchange of ideas with the resource persons will be a wonderful experience to
the participants of CSEA.
The topics selected for deliberations are very apt. I congratulate Dr. M. Usha Rani,
Convener for organizing this CSEA-2012.
Prof. D. Bharathi
MESSAGE
Information and Communication Technology (ICT) has emerged as a leading
accelerator of growth and economic prosperity across the globe. Especially, it has resulted in an
economic boom, and creation of jobs in India. Though it is a welcome trend, it is observed that
most of the IT jobs coming in our way are routine jobs with relatively low remuneration
packages. We need to acquire better skills to tackle challenging problems in ICT.
I hope that the conference of this magnitude provides an excellent opportunity to the
academic fraternity to quickly capture the exploding Technological advances and trends. I wish
the conference a great success.
Prof. C. Easwar Reddy
Director
School of Engineering and Technology
SPMVV(Women’s University)
Tirupati – 517 502.
Prof. K. Sandhya Rani , M.Sc.,M.Tech., Ph.D Department of Computer science Sri Padmavati Mahila Visvavidyalayam (Women’s University) Tirupati.
MESSAGE
The Department of Computer Science is organizing a National Conference on “Computer
Science, Engineering and Applications” (CSEA – 2012) on 9th
and 10th
November, 2012 at Sri
Padmavathi Mahila Visvavidyalayam, Tirupati. The conference covers various topics related to
Computer Science, Engineering and Applications. The conference gives an opportunity to
academicians, researchers and students to explore knowledge in latest research works and
motivates them towards active research. I congratulate the participants for the interest they have
shown towards the conference.
I congratulate the Convener Dr. M. Usha Rani for her efforts in organizing the
conference. I wish the conference a grand success.
Prof. T. Sudha, M.Sc., M.Phil., MS, Ph.D. Head & BOS Chair Person Department of Computer science Vikrama Simhapuri University, Nellore.
MESSAGE
The Department of Computer Science is organizing a National Conference
on “Computer Science, Engineering and Applications” (CSEA – 2012) on 9th
and
10th
November, 2012 at Sri Padmavathi Mahila Visvavidyalayam, Tirupati. In this
era of globalization and high competitions, computers, networking and
communications have emerged in the forefront of every field of life. Innovations in
these area are rapid and are providing crucial edge for development of any
nation.The theme in the conference is thus highly appropriate and significant for
current needs.
I congratulate the Convener Dr. M. Usha Rani for her efforts in organizing
the conference. I wish the conference a grand success.
T. Sudha
Prof. S. Jyothi M.Sc., M.S., Ph.D.
BOS Chairperson &
Head(I/C) CSE & IT
Department of Computer Science
Sri Padmavati Mahila Visvavidyalayam
Tirupati.
MESSAGE
I am happy to say that our department is organizing a Two Day National Conference on
Computer Science, Engineering and Applications (CSEA-2012). I strongly believe that this
conference will once again provide an opportunity to advance communication between
academics, researchers and industry. It is during this event that participants from around the
Nation come together, where scientists from the university, the industry, and young researchers
will have the chance to network, exchanging useful knowledge in one location.
I congratulate Dr. M. Usha Rani, Convener, CSEA-2012 for her efforts in organizing the
conference. I wish the Conference a great success.
PROGRAMME
Date 9/11/2012, Friday
Time Event Venue
8.30 AM to 10.00 AM
&
1.00 PM to 2.00 PM
Registration Saaveri Seminar Hall,
SPMVV
10.00 AM to 11.30 AM Inauguration Saaveri Seminar Hall,
SPMVV
11.30 AM to 11.45 AM Tea Break
11.45 AM to 1.30 PM
Session – ST1
Plenary Speech
&
Paper presentations
Saaveri Seminar Hall
Session – AR1 Saaveri Conference Hall
1.30 PM to 2.00 PM Lunch
2.00 PM to 5.00 PM
Session – ST2
Plenary Speech
Coffee Break
&
Paper Presentations
Saaveri Seminar Hall
Session – ST3 Saaveri Conference Hall
Session – AR2 Room #5, Dept. of Computer
Science
Session – AR3 e-Class Room, Dept. of
Computer Science
Date 10/11/2012, Saturday
9.00 AM to 10.00 AM
&
1.00 PM to 2.00 PM
Registration Dept. of Computer Science,
SPMVV
10.00 AM to 1.00 PM
Session – AR4 Plenary Speech
Coffee Break
&
Paper Presentations
Room #5, Dept. of Computer
Science
Session – AR5 e-Class Room, Dept. of
Computer Science
1.00 PM to 2.00 PM Lunch
2.00 PM to 5.00 PM
Session – AR6 Plenary Speech
Coffee Break
&
Paper Presentations
Room #5, Dept. of Computer
Science
Session – AR7 e-Class Room, Dept. of
Computer Science
SESSION-ST1 November 9, 2012 (Friday)
Saaveri Seminar Hall, SPMVV, Tirupati. Time: 11.45 AM – 1.30 PM
Plenary Speech
S.No. Paper
Code Title Authors
1 ST01 Digital Image Processing R. N. Vinodini
P. Hareesha
2 ST03 Study on methodology of Ethical
Hacking
G. Archana
3 ST06 Green Computing
D. Anitha Sahithi
K. Jyothi
4 ST07 Efficiency of Sliding window protocol
using POOSL
K. Padma
G. Hareesha
5 ST08 A Review on Interaction Design for
Touch screen Applications
M. Thipna
K. Thulasi
6 ST12 Natural Computing Interface Through
Artificial Cloud Computing
D. J. Samatha Naidu
Dr. P. Chitti Babu
G. Suresh
S. Shabir
7 ST13 A Conceptual way of cryptography in
Smart Cards for Vehicle control System
D. J. Samatha Naidu
Dr. P. Chitti Babu
S. Shabir
S. Riyaz
8 ST16 Current Techniques for Fingerprint
Recognition
Padmaja
Siva Sankar Raju
9 ST20 Palm Vein Technologies A. Rupa Devi
N. Udaya Lakshmi
10 ST27 3G vs WiFi
A. Lingamurthy
K. Darshan
SESSION-ST2 November 9, 2012 (Friday)
Saaveri Seminar Hall, SPMVV, Tirupati. Time: 2.00 PM – 5.00 PM
Plenary Speech S.No.
Paper
Code Title Authors
1 ST02 Pill Camera D. Anusha
2 ST05 Expert System
S. Latha
Ch. Geetha
3 ST09 A Survey on 4G Communications M. Kalavathi
M. Kavya
4 ST11 Cloud Computing – New Cutting Edge to
Business
T. Madhavi
Y. Anusha
5 ST14 Data Mining and Warehousing K. Mohanachari
6 ST15 Bloom Box Energy
Y Prasanthi
K. Ravali
7 ST24 Introduction to Network Security M. Kullai Reddy
8 ST25 Application of Visualization Technology
in Spatial Data mining
K. Bhargavi
K. P. Jaya Prakash
9 ST26 A Survey on Apriori Algorithm on
Association Rules
N. Chandana
R. Dharani
10 ST29 Haptic Technology V. Latha
M. Sowjanya
SESSION-ST3 November 9, 2012 (Friday)
Saaveri Conference Hall, SPMVV, Tirupati. Time: 2.00 PM – 5.00 PM
Plenary Speech S.No.
Paper
Code Title Authors
1 ST04 Surface Technology O. Pushpa Latha
D. Ramya Krishna
2 ST10 Data Warehousing & Data Mining
M. Lokesh Reddy
G. Venkatesh Babu
3 ST17 A DSP based On-Line UPS G. Siva Ramaiah
K. Nagaraju
4 ST18 Eyegaze Communication System S. Muni lakshmi
B. Uma Maheswari
5 ST19 A Survey on Artificial Intelligence
A. Neethravathi
M. Jagadeesh Chowdary
6 ST21 A Survey on Cloud Computing and
Applications
G. Prasanthi
J. Rekha
7 ST22 5G Mobile Technology S. Muni lakshmi
N. Bharati
8 ST23 A Survey of Routing Protocols in Mobile
Ad Hoc Networks and wireless sensors
C. R. Surendra Reddy
K. Ravi Babu
9 ST28 Bandwidth Estimation in Broadband
Access Networks
L. R. Manohar Reddy
10 ST30 5 Pen PC Technology R. Hemalatha
G. Priyamvadha
SESSION-AR1
November 9, 2012 (Friday)
Saaveri Conference Hall, SPMVV, Tirupati.
Time: 11.45 AM – 1.30 PM
Plenary Speech
S.No. Paper
Code Title Authors
1 AR02 An Efficient Id-Based Signature Scheme
With Batch Verifications
P. V. S. S. N. Gopal
T. Gowri
G. Swapna
P. Vasudeva Reddy
2 AR08 Text Clustering using Mixture Models
R. C. Saritha
Annarao kulkarni
3 AR42 Resolving Application Development Issues using
SOA
Y. Kiran Kumar
G. Sujatha
G. Jagadeesh Kumar
4 AR45 Binary Tree Structure Approach Based Digital
Watermarking
S. B. Sridevi
5 AR46 Mobility scenario-based Performance Evaluation
of Preemptive DSR Protocol for MANET
K. Sangeetha Supriya
Y. Mohana Roopa
6 AR47 Multimodal Biometrics – An Overview V. Sireesha
Dr. K. Sandhya Rani
7 AR55 Removing an Unnecessary Barrier in the
Composite Object Data Model
M. Ravi Prasad
8 AR56 Energy Efficient Zone Disjoint Shortest Multipath
Routing Protocol
K. Muralidhar
Dr. N. Geethanjali
9 AR62 Reducing The Correcting Cost Of Faulty Nodes In
Externally Managed Overlay Networks
V. L. Pavani
Dr. B. Sathyanarayana
10 AR64 A Hierarchical Pattern Matching Algorithm by
Using Intrusion Detection System
E. Gayathri
Dr. N. Geethanjali
11 AR91 Magnetic Resource Force Microscopy for
Reconstruction of H-B Sparse Fingerprint Image
Josphineleela. R
M. Ramakrishnan
12 AR93 An Elgamal Type Digital Signature Scheme
Over Circulant Matrices
B. Umaprasada Rao
R. Mohana Ramana
P. Vasudeva Reddy
SESSION-AR2 November 9, 2012 (Friday)
Venue: Dept. of Comupter Science, SPMVV, Tirupati. Time: 2.00 PM – 5.00 PM
Plenary Speech
S.No. Paper
Code Title Authors
1 AR20 New BEC Design for Efficient Multiplier C. Nageswararao
A. Kishore
B. Saroja
Munishankar
2 AR21 A Dual Covered Broadcast Technique with
Negative Acknowledgements to avoid
Piggybacking Neighbor Problems in Mobile
Adhoc Networks
D. J. Samatha Naidu
Dr. P. Chitti Babu
Dr. C. Shobha Bindu
Dr. A. Subramanyam
3 AR28 A Survey on Extracting the Patterns using
Different Techniques of Neural Network
P. Venkateswar Rao
A. Bhaskar
S. Ramaiah
4 AR34 A Survey on Implementation of Automated and
Integrated Data Sources in Key Word Based
Web Information Retrieval
P. Sunil Kumar Reddy
K. Suneetha
5 AR36 Security Tracing Anonymity In Wireless Mesh
Networks
M. B. Mukesh Krishnan
T. Balachander
6 AR39 Clogging Control by Using Congestion Free
Routers
T. Srikanth
7 AR40 Study on Dimensionality Reduction Techniques
and Applications
G. N. Ramadevi
Dr. K. Usha Rani
8 AR51 Quality of Service Aware Dynamic Web Service
Composition
P. Rajasekar
C. M. T. Karthigeyan
9 AR57 Neuro-Fuzzy Systems and Applications – A
Review
K. Vijaya Sri
Dr. K. Usha Rani
10 AR68 Relevance Feedback for Content Based Image
Retrieval Based on Multitext on Histogram and
Microstructure Descriptor
K. Kranthi Kumar
Dr. T. Venu Gopal
M. Rama Krishna
11 AR71 A Cloud Frame Work for Monitoring People
Health
R. Nagarjuna Reddy
L. Narasimha Sai Kiran
G. S. Prasada Reddy
12 AR84 A Novel Approach for Clustering Web Services
and Rest Services Using WSDL
N. P. Shangaranarayanee
Dr. T. Rajendran
P. Krishna Sankar
13 AR85 Attacks and Challenges in Wireless Mesh
Networks
K. Venkata Ravi
P. Nageswararao
Dr. Sanjay Kumar
14 AR86 Data Preprocessing for efficient External Sorting
S. Hrushikesava Raju
Dr. T. Swarna Latha
SESSION-AR3 November 9, 2012 (Friday), Time: 2.00 PM – 5.00 PM
Venue: Dept. of Computer Science, SPMVV, Tirupati.
Plenary Speech
S.No. Paper
Code Title Authors
1 AR10 A Sharp and High Resolution Image Generation
Using DWT and SWT
K. Vijay
Sk. Mujafar Ahmed
2 AR15 Digital License Plate Identification
K. Vijay
K. Sundar Srinivas
3 AR16 Model – RF Based Classroom Intelligence
Computation
K. Sundar Srinivas
M. Naga Lakshmi Kalyani
4 AR23 To Analyze Performance in Reactive Routing
Protocol Using Mobile Ad-hoc Networks
K. Venkararamana
S. Hemasri
K. Muniramaiah
5 AR24 To analyze difference between AODV and
DSDV Routing Protocols in MANETs
K. Venkata Ramana
P. C. Devi
B. Chaithanya
6 AR25 Determining the Positioning Algorithm for
Fingerprinting using WLAN
Indu Maurya
Ashish Maurya
Priyanka Maurya
7 AR35 Comparative Study of Routing Techniques,
Their Attacks and Prevention methods in
MANET
MD Sirajul Huque
8 AR63 Providing Location-Aware End-to-End
Secure communication in Wireless Sensor
Networks
T. Kesava Rao
C. Viswanadh
G. Suresh
9 AR75 HYBRID Markov model is used for tracking in
MANET with structure free approach
M. ChandraMouli Reddy
K. Mahesh Kumar
J. Sreekanth Reddy
10 AR76 Ontology Model is Used for Gathering
Multidimensional Analysis of Web Information
in Single Hierarchy
K. Mahesh Kumar
M. ChandraMouli Reddy
J. Sreekanth Reddy
11 AR77 Estimating Marketing Analysis for Customer
Behavior with the Help of Bayesian
Classification
K. Mahesh Kumar
M. Chandra Mouli Reddy
J. Sreekanth Reddy
12 AR87 An efficient Fault-Tolerance Technique using
Check-pointing and Replication in Grids using
Data Logs
S. Dilli Babu
Ch. Ramesh Babu
Dr. Ch. D. V. Subba Rao
13 AR88 Comparison study of an efficient Algorithm for
Discovering Maximum Frequent Item sets
P. B. Archana
Dr. A. Ram Mohan Reddy
14 AR89 A Refuge Business model for Cloud
Computing using novel AES Approach
D. Prathima
Dr. P. Venkata Subba Reddy
15 AR90 A Baseline System for Telugu – English
Translation Using Moses
D. Praveena
Dr. A. Ram Mohan Reddy
SESSION-AR4
November 10, 2012 (Saturday)
Venue: Department of Computer Science, SPMVV, Tirupati.
Time: 10.00 AM – 01.00 PM
Plenary Speech
S.No. Paper
Code Title
Authors
1 AR04 A Survey On Web Recommender Systems
K. Suneetha
P. Sunil Kumar Reddy
2 AR18 Hypervisor Security in Microsoft Private Cloud S. Reddy Prasad
Dileep Jyothiraj
3 AR27 Applying Cloning process in Agile
Development
M. Sowmya Vani
D. T. T. Vijaya Kumar
4 AR41 Ad Hoc Routing for Bluetooth Using Epidemic
Algorithm
A. Sai Suneel
5 AR43 Analyzing the Detection of Active Attacks in
MANETs
P. Nirupama
G. M. Padmaja
6 AR58 WIRELESS NETWORKS: A Comparison and
Classification based on Outlier Detection
Methods
T. Kavitha
A. Chandra
7 AR59 HONEY POTS: A New Mechanism for
Network Security
A. Chandra
K. Lalitha
8 AR60 Effective Implementation Of Query
Optimization Through Performance Tuning
Techniques On Web
P. Jyotsna
P. Sunil Kumar Reddy
Prof. P. Govindarajulu
9 AR69 Information Technology Related Innovations in
Every Business Function
K. Divya
10 AR74 Image Denoising Using Fusion Based Curvelts
and Wavelets Transform
P. Subba Lakshmi
S. Fairoz Sulthana
11 AR78 A Crypto Virology: A Deadly Combination S. Heera
P. Vaishnavi
S. Surekha
12 AR80 An Improved K-means Clustering
Algorithm with refined initial Centroids
G. Pradeepini
Prof. S. Jyothi
13 AR83 Prediction and Classification of Speech in
Speech Recognition System
N. Usha Rani
SESSION-AR5
November 10, 2012 (Saturday)
Venue: Department of Computer Science, SPMVV, Tirupati.
Time: 10.00 AM – 1.00 PM
Plenary Speech
S.No. Paper
Code Title Authors
1 AR11 Various Approaches of Vision-Based Deep Web
Data Extraction (VDWDE) and Applications
M. Lavanya
M. Dhanalakshmi
2 AR29 Spatial Knowledge for Disaster Identification R. Sanjeev Reddy
J. Kishore Kumar
A. V. Sriharsha
3 AR30 Information Security Using Biometric Methods K. Usha Sri
4 AR32 Mining of Frequent Positive Opinions by Using
Mathematical Techniques
M. Dhanalakshmi
M. Lavanya
5 AR48 A Privacy Preserving Clustering Method Based on
Fuzzy Approach and Random Rotation
Perturbation
M. Naga lakshmi
Dr. K. Sandhya Rani
6 AR49 A Survey on various Pattern recognition methods
for the Identification of a different types of Images
V. Sucharita
Dr. S. Jyothi
7 AR53 Analysis Of (2,2) Visual Cryptographic Scheme
M. Nirupama Bhat
Dr. K. Usha Rani
8 AR65 Data Transformation Services P. S. Sailaja
9 AR67 Augmented Reality Based Approach In
Educational Field Using AR Books
D. Abhishekh
B. Ramakantha Reddy
R. Raja Kumar
10 AR70 Duplicate Detection of Query results from Multiple
Web Databases
G. Bala Krishna Priya
11 AR73 Comparative Study of Different Approaches of
Spectral Clustering on Graphs
G. Sujatha
Dr. K. Usha Rani
12 AR79 Design of Low Voltage Switched Op-amp with
rail-to-rail to input common mode range
N. Kusuma
P. Hemachandu
13 AR82 A Study of Semantic Web for E-Business and E-
Learning
J. Murali
SESSION-AR6
November 10, 2012 (Saturday)
Venue: Department of Computer Science, SPMVV, Tirupati.
Time: 2.00 PM – 5.00 PM
Plenary Speech S.No. Paper
Code Title
Authors
1 AR01
Finding Number of Cluster Services in
Educational Cloud Using EDBE
A. Srinivasulu
Dr. Ch. D. V. Subbarao
M. Sreedevi
K. Lalitha
2 AR05 Future Trends of Text Clustering S. Suneetha
Dr. M. Usha Rani
3 AR07 A study on Privacy Preserving Techniques used
in Cloud Computing Services
P. Gowthami
B. Lavanya
4 AR12 Study on Various Methods for Text Clustering
R. Rajani
V. Sireesha
5 AR14 Weighted Association Rule Mining- A Review M. Kalpana Devi
Dr. M. Usha Rani
6 AR19 Overview of Web Components
Dr. G. Sreedhar
7 AR26 Learn++ using Dynamic Weighting Ensembles G. T. Prasanna Kumari
8 AR37 Development of a Concordance for Sanskrit
using Rule-based Approach
V. Sethuram
K. Samkeerthy
Dr. R. J. Rama Sree
9 AR44 Modeling an Expert System for Diagnosis of
Gestational Diabetes Mellitus Based on Risk
factors
K. Vijaya Lakshmi
E. Sreedevi
Prof. M. Padmavathamma
10 AR54 Contrast Stretching Enhancement Techniques
for Acute Leukemia Images
V. Raja Rajeswari
N. Ramesh
11 AR66 Data on The Road in Intelligent Transportation
Systems
K. Bhargavi
Dr. S. Jyothi
12 AR92 Classification of Agriculture Land using Spatial
Data mining Techniques based on Remote
Sensing Images with GIS
M. Sirish Kumar
Dr. S. Jyothi
SESSION-AR7
November 10, 2012 (Saturday)
Venue: Department of Computer Science, SPMVV, Tirupati.
Time: 2.00 PM – 5.00 PM
Plenary Speech
S.No. Paper
Code Title
Authors
1 AR03 Diagnosis of Glomerulonephritis Based on the
Physical Symptoms and Clinical observations
of the Blood Samples Using An Artificial
Neural Network
G. Sumana
Dr. G. Anjan Babu
2 AR06 Evaluation of The Signaling Performance of
Virtual Link Setup With the Quality of
Services
K. Sailaja
N. Nagarjuna
3 AR09 The Data Mining Technique – Trend Analysis
on Expenditure & Households
Registered/Working NREGS data of A.P.
Dr. M. Usha Rani
4 AR13 Research Challenges in Cryptography and its
Applications
P. Krishna Chaitanya
K. Priyanka
5 AR17 Experiments in Probabilistic Context Free
Grammar for URDU Language
M. Humera Khanam
6 AR22 A Framework for Context-aware and Emotion-
aware AmI Systems
J. Madhan
V. S. Sandhya
7 AR33 Developing a Middle Ware Architecture for
Health Care
T. Sandhya
8 AR38 Stanford POS Tagger
G. Prasanna
A. Vinaya simha
Dr. R. J. Rama Sree
9 AR50 Secure Data Transfer Using Audio
Steganography – A Survey
T. Anuradha
Dr. K. Usha Rani
10 AR61 A Novel Dynamic Route Selection Algorithm
for Secure Data Transmission
B. Muneendra Nayak
Dr. V. Ragunatha Reddy
Dr. E. Madhusudhana Reddy
11 AR72 A Parameterized Runtime Analysis of
evolutionary algorithm for minimization in
Euclidean TSP
G. Nagalakshmi
Dr. S. Jyothi
12 AR94 Wavelet Transform Based Dental Image
Registration for Aligning Dental Radiographs
Dr. A. Yaswanth Kumar
Dr. R. Seshadri
AR-01 Finding Number of Cluster Services in Educational Cloud using EDBE
Srinivasulu Asadi1, Dr. Ch. D. V. Subbarao
2, M. Sreedevi
3 and K. Lalitha
4
1Dept. of IT, SVEC, Tirupati. [email protected] 2Dept. of CSE, SVUCE, Tirupati. [email protected]
3Dept. of MCA, S. V. University, Tirupati. [email protected] 4Dept. of CSSE, SVEC, Tirupati. [email protected]
Abstract: One of the major problems in cluster analysis is the determination of the number of
cluster services in Educational Cloud. In this paper, we implement a new method for determining
the number of clusters called Extended Dark Block Extraction (EDBE), which is based on an
existing algorithm for Visual Assessment of Cluster Tendency (VAT) of a data set. Educational
Cloud is a combination of three types of Clouds such as Private, Public and Hybrid. This cloud
provides all types of Services such as Software as a Service, Platform as a Service and
Infrastructural Services. To accommodate an increasing need for high performance computing,
we wish to create Educational Cloud. This is a multi-departmental effort that will greatly benefit
both undergraduate, graduate students and educational institutions. Access to the Student cluster
will facilitate student research in Computer Science, Information Technology and more. Cloud
computing and Software as a Service infrastructure are becoming important factors in E-
commerce and E-business processes. Users may access simultaneously different E-services
supplied by several providers. An efficient approach to authenticate and authorize users is
needed to avoid problems about trust and redundancy of procedure. This educational cloud helps
poor students, society and educational institutions. It provides services such as software as a
service like student laboratory subject software namely C, C++, Java, Multimedia and Adobe
Photoshop. Platform as a service such as .Net, Java, Apex etc. Infrastructure as a service like
1MB, 1GB, and 1TB spaces etc. Educational cloud gives platform for all students, society and
educational institutions with free of cost. The research challenges involve in educational cloud
are security, elasticity, scalability, privileges, services etc. information etc.
Keywords: Clustering, EDBE, VAT, Cloud Security, Data Centre, Educational Cloud; Hybrid
Cloud IaaS; PaaS; Private Cloud; Public Cloud and SaaS.
AR02 An Efficient Id-Based Signature Scheme With Batch Verifications
P. V. S. S. N. Gopal1, T. Gowri
2, G. Swapna
1 and P. Vasudeva Reddy
1
1Dept. of Engg. Mathematics, AU. College of Engineering, Andhra University, Viakhapatnam. 2Dept. of Electronics and Communications Engineering, GIET, GITAM University, Visakhapatnam.
Abstract: Many group oriented applications and multicast communications often need to verify
which group members have sent/received a message. However, individual verification of signed
messages would require a significant computation cost. A secure signature scheme with
supporting batch verifications extremely improves the performance. In this paper we propose an
efficient ID-based digital signature scheme, which supports batch verifications, using bilinear
pairings over elliptic curves. We prove that the proposed scheme is secure against existential
forgery under adaptive chosen message and ID attack in the random oracle model with the
assumption that the Computational Diffie-Hellman Problem is hard. Finally, we compare our
scheme with the related schemes.
Keywords: ID-based cryptography, Bilinear Pairings, Digital Signature, CDH Problem.
AR03 Diagnosis of Glomerulonephritis Based on the Physical
Symptoms and Clinical observations of the Blood Samples Using An
Artificial Neural Network
G. Sumana1 and Dr. G. Anjan Babu
2
1Programmer, Computer Center, SPMVV, Tirupati. [email protected] 2Associate Professor, Dept. of Computer Science, SVU, Tirupati. [email protected]
Abstract: An artificial neural network (ANN) is a computational model that attempts to account
for the parallel nature of the human brain. Neural networks provide significant benefits in
medical research. They are actively being used for such applications as locating previously
undetected patterns in mountains of research data, controlling medical devices based on
biofeedback, and detecting characteristics in medical imagery. The main purpose of this study is
to construct an Artificial Neural Network for the differential diagnosis of kidney disease,
glomerulonephritis based on the physical symptoms and Clinical tests conducted on blood
samples of different individuals in the lab. In this study Back propagation feed forward neural
Network is constructed, trained and tested using Delta Learning Rule.
Keywords: Artificial neural networks, Glomerulonephritis, Computer-aided medical diagnosis,
multilayer feed forward neural network.
AR-04 A Survey on Web Recommender Systems
K. Suneetha1 and P. Sunil Kumar Reddy
2
1Sr. Lecturer, Dept. of M.C.A, SVEC, Tirupathi. [email protected] 2Research Scholar, Dept. of Comp. Science, S.V. University, Tirupathi. [email protected]
Abstract: One of the application areas of data mining is the World Wide Web (WWW or Web).
The amount of information available on the Web is growing rapidly, as well as the number of
Web sites and Web pages per Web site. Consequently, it has become more difficult to find
relevant and useful information for Web users. Web usage mining is concerned with guiding the
Web users to discover useful knowledge and supporting them for decision-making. Web
recommendation is a very active research field and new approaches related to its application
appear on a regular basis. The Recommender Systems are applied in many areas such as: web-
browsing, information filtering, net-news or movie recommender and e-Commerce. In this paper,
a survey work is done in the field of web recommendation system.
Keywords: Personalization, content-based filtering, collaborative-based, hybrid-based
approach, recommender system.
AR-05 Future Trends of Text Clustering S. Suneetha
1 and Dr. M. Usha Rani
2
Research Scholar1, Head and Associate Professor2, Department of Computer Science, SPMVV, Tirupati.
Abstract: Text Mining, a variation of Data Mining that extracts knowledge from very large text
corpus. „Text Clustering‟ is the organization of a collection of text documents into clusters based
on similarity. The main goal of clustering is to maximize both the homogeneity within each
cluster and heterogeneity among different clusters. This paper explores some basics of Text
Clustering, along with the importance, properties and variations of evolutionary clustering. It
also outlines the recent works in the field of Text Clustering in accordance with dynamic data
and frequent item sets keeping an eye towards the future trends of text clustering. Exploiting an
effective and efficient method in Evolutionary Text clustering to achieve better snapshot
clustering quality at lower history cost would be an essential direction of research.
Keywords: Text Mining, Text Clustering, Incremental clustering.
AR-06 Evaluation of The Signaling Performance of Virtual Link Setup
With The Quality of Services
K. Sailaja1 and N. Nagarjuna
2
1 Head of MCA, CREC, Tirupati. [email protected] 2 Academician, Dept. of CSE, CREC, Tirupati. , [email protected]
Abstract: While the resource reservation basically takes only a small amount of time, the setup
and tear down of virtual links take longer due to shell script execution. Instead of using a
resource reservation protocol and a separate tunnel setup protocol we combined both protocols
leading to a more efficient solution, which can be additionally secured by using the session
authorization object. In this paper, we proposed a Virtual Link Setup Protocol (VLSP) that
permits an authenticated and dynamic setup of virtual links with dedicated Quality-of-Service
guarantees. We described the design and implementation of VLSP and evaluate its signaling
performance. The performance is more fine-grained evaluations regarding the overhead induced
by the creation of a tunnel for the virtual link. The evaluation results show that integrity
protection of virtual link setup signaling is possible with small computational overhead.
AR-07 A study on Privacy Preserving Techniques used in
Cloud Computing Services
P. Gowthami and B. Lavanya
Faculty in Dept. of Computer Science, SPMVV, Tirupati.
[email protected], [email protected]
Abstract: Cloud computing is an Internet-based computing, whereby shared resources, software
and information are provided to computers and other devices on demand. People can only enjoy
the full benefits of cloud computing, each cloud service will exchange data with other cloud.
When the data is exchanged between clouds there exists the problem of privacy. Data
confidentiality and access privacy protection for data management and query processing services
are in the cloud. An understanding of current research and systems is essential for designing new
protection techniques and building secure data services. In this I listed some privacy preserving
techniques used in cloud computing services.
Keywords: Cloud Computing, Privacy Preserving, Data Management, Query Processing.
AR-08 Text Clustering using Mixture Models
R. C. Saritha1 and Annarao kulkarni
2
1Senior Technical Officer, 2Principal Technical Officer, C-DAC Knowledge Park, Bangalore.
[email protected], [email protected]
Abstract: The data generated after statistical process is effective and describes the data by
finding statistical model that best fits the data, where the statistical model is described in terms of
distribution and set of parameters for that distribution. Mixture models are particular kind of
statistical models and view the data as a set of observations from a mixture of different
probability distributions. Each distribution corresponds to a cluster and parameters of each
distribution provide description of corresponding cluster, typically in terms of its center and
speed. This paper explains the state of art about the text clustering techniques and also about well
known k-means algorithm for text documents and Expectation–Maximum (EM) algorithm,
which estimates mixed model parameters using maximum likelihood. The Experiment results of
both K-means and EM algorithm on different datasets shows that mixture models are more
general and find clusters of different sizes and shapes than k-means.
Keywords: Text mining, Clustering, k-means, Mixture models, Expectation–Maximum (EM)
algorithm, Maximum Likelihood estimation, Gaussian mixture model.
AR-09 The Data Mining Technique – Trend Analysis on Expenditure
& Households Registered/Working NREGS Data of A.P.
Dr. M. Usha Rani, Associate Professor, Dept. of Computer Science, SPMVV, Tirupati.
Abstract: Data mining merged the ideas from statistics, machine learning, databases and parallel
computing. The data mining techniques such as characterization, discrimination, classification,
clustering, outlier and trend analysis, etc. may apply on National Rural Employment Guarantee
Scheme (NREGS) data of Andhra Pradesh. Expenditure on 22 districts for unskilled labor,
material and contingency are collected separately from January 2010 to December 2011(month-
wise data). The hidden patterns and information find from trend analysis about the expenditure
on 22 districts of Andhra Pradesh for unskilled labor, material and contingency are presented in
this paper. From 2006 to 2011 year caste-wise households that are registered, working from these
registered households are collected for 22 districts of AP. The hidden patterns and information
find from trend analysis about the households registered/working is also presented in this paper.
This information may be helpful to the government for budget allocation.
Keywords: NREGS Database, Expenditure analysis, Households registered/working analysis,
Trend analysis.
AR-11 Various Approaches of Vision-Based Deep Web
Data Extraction (VDWDE) and Applications
M. Lavanya1 and M. Dhanalakshmi
2
1Assistant Professor(SL), MCA Dept, SVEC, A.Rangampet, Tirupati. [email protected] 2Assistant Professor, CSSE Dept., SVEC, A. Rangampet, Tirupati. [email protected]
Abstract: Web Data Extraction has become a very serious problem especially having vision
based features. We have studied different approaches in a lane range of application domains.
Many approaches to extracting vision based data from the Web have been designed to solve
specific problems and operate in web application domains. Other techniques reuses in the
meadow of Information Extraction. This paper aims in providing structured and comprehensive
vision-based features of research efforts made in the field of Web Data Extraction. The overview
of our work is to present a cataloguing of vision based approaches in terms of the applications
for which they have been working. This differentiates our work from other researcher‟s efforts to
organize vision-based approaches on the basis of the algorithms, techniques and tools they use.
We divide vision based Web Data Extraction approaches into different kinds along with an
application how the data regions are extracted from a deep web page.
Keywords: vision-based features, web data extraction, Enterprise applications, Social web
applications.
AR12 Study on Various Methods for Text Clustering
R. Rajani1 and V. Sireesha
2
1HOD & Assoc. Professor, Dept. of MCA, NEC, Nellore. [email protected], 9502496465. 2Asst. Professor, Dept. of MCA, NEC, Nellore. [email protected], 9030080273.
Abstract: Clustering text documents into different category groups is an important step in
indexing, retrieval, management and mining of abundant text data on the Web or in corporate
information systems. Text clustering task can be intuitively described as finding, given a set
vectors of some data points in a multi-dimensional space, a partition of text data into clusters
such that the points within each cluster are similar to each other. Good text clustering enables
better information services by browsing and organizing documents into meaningful cluster
hierarchies and provides a useful complement for traditional text search engines when key-word
based search returns too many documents. Among others, the challenging problems of text
clustering are big volume, high dimensionality and complex semantics. Herewith, we present the
study of few methods involved in text clustering.
Keywords: document clustering, document representation, rough sets, text mining.
AR-13 Research Challenges in Cryptography and its Applications
P. Krishna Chaitanya1 and Ms. Priyanka Koduru
2
Senior S/W Engineer, IGATE Global Solutions, Bangalore.
Lecturer, Dept. of CSE, School of Engineering & Technology
SPMVV(Women‟s University), Tirupati – 517502.
Abstract: Cryptography is an indispensable tool for protecting information in computer systems.
In this paper some research challenges that are presented which may be helpful to the researchers
connected to fields like Data mining, Biometrics, Networks and Network security. The
challenges are like - low cost and low power solutions(Ambient Intelligence); highly efficient
solutions for applications such as bus encryption, encryption in Terabit networks; high security
solutions: for e-voting, e-health; secure watermarking techniques; need to build cryptosystem
that offer long term security, Provable security: cryptography has been very successful in
developing security models and security proofs within these models based on a limited set of
assumptions; Digital right management: several techniques such as fingerprinting and
watermarking; Privacy: diffusion of sensing, location based services, explosive growth of storage
capacity and communication mechanisms, and data mining technologies present a major risk to
privacy.
Keywords: Ambient Intelligence, Digital data management, Provable security, Privacy.
AR-14 Weighted Association Rule Mining- A Review
M. Kalpana Devi1 and M. Usha Rani
2
1Research Scholar, 2Associate Professor, Head, Dept. of Computer Science, SPMVV, Tirupati.
Abstract: Traditional association rule mining consider support confident measures to find out
frequent item sets, it assumes all items are having equal significance. Where as weighted
association rule mining assigns weights to items based on different aspects. Because researchers
are more concerned with qualitative aspects of attributes (e.g. significance), as compared to
considering only quantitative ones (e.g. number of appearances in a database etc). Because
qualitative properties are required in order to fully exploit the attributes present in the dataset. In
last few years a number of weighted associative rule mining algorithms have been proposed, i.e.
WAR, WARM, WFIM, WIP, WUARM, FWARM and others. These algorithms employ
different rule discovery, rule ranking, rule pruning, rule prediction methods. This paper focuses
on surveying and comparing the weighted associative rule mining techniques with regards to the
above criteria.
AR-17 Experiments in Probabilistic Context Free Grammar for Urdu Language
M. Humera Khanam, Associate Professor, Dept. of CSE,
SVU College of Engineering, Tirupati. [email protected]
Abstract: In this paper we describe the expansion of probabilistic context free grammar for Urdu
language, we did some experiments in probabilistic context free grammar for Urdu language,
extraction of CFG rules through The Penn Treebank, evaluation of PCFG from CFG. This PCFG
is further useful for parsing the Urdu Sentences. The Tree-bank based grammar is the best
technique for building up the PCFG for language through some easy and understandable steps
as compared to theoretical. A PCFG can be used to estimate a number of useful probabilities
concerning a sentence and its parse-tree(s). The resulting Penn Treebank based PCFG is widely
used in natural language processing, speech recognition, and integrated spoken language systems
as well as in theoretical linguistics.
Keywords: PCFG, Urdu Language, Penn tree bank.
AR-18 Hypervisor Security in Microsoft Private Cloud
S. Reddy Prasad and Dileep Jyothiraj Project Assistants, DST-PURSE Centre, S.V. University, Tirupati. [email protected]
Abstract: When you move from server consolidation to using virtualization to create a public,
private or hybrid cloud computing environment, you move from a traditional datacenter to a
dynamic, service oriented and focused cloud deployment. When virtualization is used in cloud
computing, you will see that the management infrastructure you used for your physical server-
based deployment will fall short virtualization based cloud infrastructure. In a traditional
datacenter, automation is not usually such a major component unless the number of client or
server operating systems to be deployed and the administrative overhead would be
overwhelming without some method of automation. In general, in today‟s Local Area Network
(LAN) based datacenter, setting up new physical servers includes at least some manual steps
performed by the admin. In contrast, in a cloud environment, the Operating System (OS) must be
highly automated to support several of the key tenets of cloud computing itself. The hypervisor
should be invisible to the network, with the possible exception of traffic destined to the
hypervisor management interface. The probability is low that the hypervisor will be attacked in
the near future because both the vulnerability of the hypervisor and the probability of an attack
are low at this time. However, there is a good chance that this will change in the future as
hackers begin to focus their efforts on hypervisors. Another security issue that‟s related to
virtualization deals with the allocating and de-allocating of resources in an elastic environment,
which might include things such as local storage associated with Virtual Machines (VMs). If
data is written to physical media or to memory and it is not cleared before that storage is
reallocated to another VM, then there is a chance for data leakage. Of course, these problems are
not unique to cloud environments and there are well-defined mitigations enabled by all
commonly used operating systems.
Keywords: Cloud, Virtual Machine, Security, Hypervisor, Network, etc.
AR-19 Overview of Web Components
Dr. G. Sreedhar, Assistant Professor, Department of Computer Science
Rashtriya Sanskrit Vidyapeetha(Deemed University), Tirupati. [email protected]
Abstract: In present days the internet has quietly become the body of business world with web
applications as the brains. The web is more and more used as a platform for full-fledged,
increasingly complex application, where a huge amount of change-intensive data is managed by
underlying database systems. The complete list of web components include: Links, Forms,
Cookies, Web Indexing, Dynamic Interface Components, Programming Language, Database,
Navigation, Graphics, Contents, Platform, Browsers, Settings and Preferences and Connection
Speed. These web components play important role in web design process:
AR-20 New BEC Design for Efficient Multiplier
Nageswararao chintapanti1, Kishore. A
1, Saroja Boda
1 and Munishankar
2
1Dept. of ECE, Siddartha Institute of Science & Technology, Puttur. [email protected], [email protected],
[email protected]. 2Assistant Professor, Dept. of ECE, Siddartha Institute of Engineering & Technology,
Puttur. [email protected]
Abstract: In this paper the performance of different types of adders are analysed. And carry
select adder (CSLA) is the lowest delay compare to other adders. Carry select adder is one of
the fastest adders used in many data-processing processors to perform fast arithmetic functions.
From the structure of the CSLA, there is a possibility for increasing the speed and reducing the
area and in the CSLA. This work uses a simple and efficient gate- level modification to
significantly reduce the area and power of the CSLA. Based on this modification 8-, 16-, 32-,
and 64-b CSLA architecture have been developed and compared with the regular CSLA
architecture. The proposed design has increased speed and reduced area and power as compared
with the regular CSLA with only a slight increase in the delay. This work evaluates the
performance of the proposed designs in terms of delay, speed(frequency)and memory. The
results analysis shows that the proposed CSLA structure is better than the regular CSLA. And it
is implemented in multiplier as application for efficient performance.
Keywords: Carry select adder(CSLA), Carry save adder, Carry skip adder, RCA, BEC.
AR-21 A Dual Covered Broadcast Technique with Negative
Acknowledgements to avoid Piggybacking Neighbor
Problems in Mobile Adhoc Networks
D. J. Samatha Naidu1, Dr. P. Chitti Babu
2, Dr. C. Shobha Bindu
3 and Dr. A. Subramanyam
4
1Assistant professor, MCA Dept, APGCCS, Rajampet, 9010581011. [email protected] 2Professor & Principal, APGCCS, Rajampet, 9441738577. [email protected]
3Associate professor, CSE Dept, JNTUA, Anantapur, 9966258359. [email protected] 4Profesor & HOD, CSE Dept, AITS(autonomous), Rajampet.
Abstract: In this paper, we propose Dual Covered broadcast with Negative
Acknowledgements. Reliability and packet delivery ratio are of key concern in Mobile Ad hoc
Networks. This algorithm takes advantage of redundant data packets in the network to achieve
high delivery ratio. The proposed algorithm achieves reliability avoiding problems in
broadcasting i.e., ACK implosion and Broadcast storm. Piggybacking neighbor information on
data packets reduces broadcast overhead and delay as compared to Double Covered Broadcast
algorithm. The use of NACK messages ensures reliable broadcasting. Some of the advantages of
this algorithm are: only the forwarding nodes transmit the packet so that the broadcast collision
and congestion are reduced; the retransmissions of forwarding nodes treated as ACKs by sender,
avoids the ACK implosion problem and the loss.
Keywords: Broadcast, forwarding node, reliability, ACKnowledgement.
AR-22 A Study on a Framework for Context-aware and
Emotion-aware AmI Systems
J. Madhan1 and V. S. Sandhya
2
1Project Manager, KGD Architectural Consultancy, Chennai.
[email protected] 2Assistant Professor, Meenakshi College of Engineering, Chennai.
Abstract: ISTAG (Information Society and Technology Advisory Group) has developed the
concept of Ambient Intelligence (AmI) in the late 1990s. AmI is an interdisciplinary field that
brings together ubiquitous computing, intelligent environments, context-awareness and emotion-
awareness technologies. The objective of this paper is to discuss about the framework for
constructing context-aware and emotion-aware AmI systems. In context-aware application
framework, issues such as the need to develop context ontologies, context servers, and to
maintain the user context information privacy are described. In emotion-aware application
framework, all the components that are needed to develop emotion-aware AmI systems are
described. The AmI system that are developed using the given two frameworks facilitate human
contact, increases the quality of work, ensures consistency, makes easy to live with and are
controllable by ordinary people.
Keywords: AmI, ubiquitous computing, ontologies, context-awareness, emotion-awareness.
AR-26 Learn++ using Dynamic Weighting Ensembles
G. T. Prasanna Kumari, Asso.Prof, Dept of CSE, Gokula Krishna College of Engg,
Sullurpet-524121. [email protected]
Abstract: In this paper, we propose an incremental learning model for ensemble classifier
systems. Learn++, an ensemble of classifiers based algorithm originally developed for
incremental learning, and now adapted for information/data fusion applications. Recognizing the
conceptual similarity between incremental learning and data fusion, Learn++ follows an
alternative approach to data fusion, i.e., Generates each classifier of the ensemble for each data
set coming from a different source, and appropriately combine the classifier outputs to take
advantage of the additional information in subsequent data sources using “weighted majority
voting” (WMV) combination rule. Learn++ creates additional classifiers trained on the new data
until the old classifiers are Out-voted, when classifying an instance from a new class. In order to
overcome the problem of out-voting when new data comes and to create new classifiers, we
propose Learn++ using dynamic weighting ensemble. This paper introduces an incremental
learning algorithm framework using dynamic weighting ensembles to effectively learn new
batches of data appearing over time without the need of retraining. This algorithm help
classifiers to learn additional information from new batches of data incrementally while
preserving previously acquired knowledge. We demonstrate that the proposed incremental
learning algorithm using dynamic weighting scheme has comparable performance with fixed
weighting scheme. When a new batch of data becomes available, a new ensemble of basic
classifiers is built solely on it so that the new information can be effectively extracted, without
interfering with existing classifiers. Another advantage is that the training process has much
better flexibility than the retraining strategy.
Keywords: Incremental learning, data fusion, learn++, weighted majority voting.
AR-27 Applying Cloning process in Agile Development
M. Sowmya Vani and D. T. T. Vijaya Kumar
Asst. Professors, Department of MCA, SVEC, A.Rangampet, Tirupati.
[email protected], 9959505412. [email protected], 9985171776.
Abstract: Agile methodology is an approach used for the development of a project which helps
to respond to the unpredictability of building software through incremental, iterative work
cadences. These methodologies are used to deal with the situations where the waterfall model
fails. In Agile development rapid construction is needed, so developer has to keep more efforts.
To reduce the burden for the developer we are proposing a technique called cloning. Duplication
or copying a fragment and reuse with or without any modifications is a well-known clone
concept in software maintenance. Several studies show that about 5% to 20% of software
systems can contain duplicated fragments, which are basically the results of copying existing
fragments. In this paper, we are proposing the applying of cloning process in agile development.
Keywords: Agile design practices, Cloning, Code Cloning, Design Cloning, Clone detection.
AR-28 A Survey on Extracting the Patterns using Different Techniques of
Neural Network
P. Venkateswar Rao ME(Ph.D)1, A. Bhaskar ME
2 and S. Ramaiah
3
1Professor & Head, 3M.Tech. Student, Dept. of CSE, ASIT, GUDUR. [email protected], [email protected]. 2Asst. Professor, Dept. of CSE, ASCET, GUDUR. [email protected]
Abstract: In the present day we have seen a rapid growth in all fields of science, business,
medicine, etc. The same rate of growth in the processing power of evaluating and analyzing the
data did not follow this massive growth. Due to this phenomenon, a tremendous volume of data
is still kept without being studied. Data mining tries to ease this problem, proposes some
solutions for the extraction of significant and potentially useful patterns from these large
collections of data. There are many technologies available to data mining practitioners, including
Artificial Neural Networks, Regression, and Decision Trees. The application of neural networks
in the data mining has become wider. Although neural networks may have complex structure,
long training time, and uneasily understandable representation of results, neural networks have
high acceptance ability for noisy data and high accuracy and are preferable in data mining. In
this paper the data mining based on neural networks is researched in detail, and the key
technology and ways to achieve the knowledge based on neural networks are also researched.
Keywords: neural networks, knowledge, patterns, data mining.
AR-29 Spatial Knowledge for Disaster Identification
R. Sanjeev Reddy1, J. Kishore Kumar
2 and A. V. Sriharsha
1Research Scholar, S.V.University, Tirupathi. [email protected] 2Lecturer in CS, S.G.Govt Degree College, Piler. [email protected]
3Research Scholar, S.V.University, Tirupathi. [email protected]
Abstract: Recent developments in information technology have enabled collection and
processing of vast amounts of personal data, business data and spatial data. It has been widely
recognized that spatial data analysis capabilities have not kept up with the need for analyzing the
increasingly large volumes of geographic data of various themes that are currently being
collected and archived. On one hand, such a wealth of data holds great opportunities for
geographers, environmental scientists, public health researchers, and others to address urgent and
sophisticated geographic problems, e.g., global change, epidemics etc,. Our study is carried out
on the way to provide the mission-goal strategy (requirements) to predict the disaster. The co-
location rules of spatial data mining are proved to be appropriate to design nuggets for disaster
identification and a framework has been suggested. Principal Component Analysis is a statistical
method for identifying patterns.
Keywords: spatial data mining, collocation rule mining, PCA.
AR-30 Information Security Using Biometric Methods
K. Usha Sri, Lecturer, Department of Microbiology, S. G. Govt PG College, Piler, INDIA – 517 214.
Abstract: Information security plays an important role in the field of Information Technology.
There are many tools and techniques that can support the management of information security.
The present day techniques for information security which involves the use of passwords and
PIN(Personal Identification Number )suffer from several limitations. With Several hackers and
unauthorized persons continually working on how to steal the information, there is always a need
to improve the security of the system. This paper highlights the need of Biometric methods can
provide a much a more security, accurate and reliable user authentication method to provide an
authorized access to information.
AR-32 Mining of Frequent Positive Opinions by Using
Mathematical Techniques
M. Dhanalakshmi1 and
M. Lavanya
2
1Assistant Professor, CSSE Dept., SVEC, A. Rangampet, Tirupati. [email protected] 2Assistant Professor(SL), MCA Dept, SVEC, A.Rangampet, Tirupati. [email protected]
Abstract: In recent years the sizes of databases has increased rapidly. This has led to a growing
interest in the development of tools capable in the automatic extraction of knowledge from data.
The term Data Mining, or Knowledge Discovery in Databases, has been adopted for a field of
research dealing with the automatic discovery of implicit information or knowledge within
databases. Several efficient algorithms have been proposed for finding frequent itemsets and the
association rules are derived from the frequent itemsets, such as the Apriori algorithm. These
Apriori-like algorithms suffer from the costs to handle a huge number of candidate sets and scan
the database repeatedly. A frequent pattern tree (FP-tree) structure for storing compressed and
critical information about frequent patterns is developed for finding the complete set of frequent
itemsets. But this approach avoids the costly generation of a large number of candidate sets and
repeated database scans, which is regarded as the most efficient strategy for mining frequent
itemsets. Finding of infrequent items gives the positive feed back to the Production Manager. In
this paper we are finding frequent and infrequent itemsets by taking opinions of different
customers by using Dissimilarity Matrix between frequent and infrequent items and also by
using Binary Variable technique. We also exclusively use AND Gate Logic function for finding
opinions of frequent and infrequent items.
Keywords: knowledge discovery, frequent items, infrequent items, similarity, dissimilarity.
AR-33 Developing a Middle Ware Architecture for Health Care
T. Sandhya, Faculty in Dept. of Computer Science, S. V. University, Tirupati.
Abstract: Hospitals depend on Data Warehousing techniques for keeping track of patient
information. The warehouse is meant to be a repository of historical patient data used to make
important treatment decisions for the patient. Secure and reliable storage of the data is needed for
quality patient care. But achieving this goal is not an easy task. Building a data warehouse can
be extremely expensive and once built, the systems can be complex to manage and maintain. In
an alternate arrangement that we have explored, middleware data hubs, allowing access to
patient information in various hubs can be used as an effective alternative. Instead of a central
repository of information, multiple hospitals can join together in this easily
scalable architecture to share data and function as a Virtual Data Warehouse(VDW). This
approach is faster and scalable but has the disadvantage of not being flexible and involves the
tedious work for converting existing databases to more or less compatible formats. In this paper,
we have discussed the benefits and risks involved in choosing to build a VDW.
Keywords: Data Warehouse, Virtual Data Warehouse, Middleware datahubs.
AR-34 A Survey on Implementation of Automated and Integrated
Data Sources in Key Word Based Web Information Retrieval
P. Sunil Kumar Reddy1 and K. Suneetha
2
1Research Scholar, Dept. of Comp. Science, S.V. University, Tirupathi. [email protected] 2Sr. Lecturer, Dept. of M.C.A, SVEC, Tirupathi. [email protected]
Abstract: Rapid growth in data integration result in automation of Experimental data that can be
revised interlinked and analyzed from different perspectives. From the users point of view
retrieving relevant information is a challenging task. In this survey, we present innovative
techniques for creating integrated views over data sources using keyword search techniques,
ranked answers, and user feedback to investigate how to automatically discover when a new data
source has content relevant to a user‟s view, performing automatic data integration for incoming
data sets which results in incorporating innumerous methods to discover related attributes,
including propagation algorithms from the machine learning community and existing schema
matchers. The user may provide feedback on the suggested new results, helping the system to
increase the cost of including a new source that is not relevant. In this survey, we discuss how
data sources can be adapted to more relevant information with global schema.
Keywords: Relevance feedback, user feedback, schema matching, schema alignment, keyword
search, data integration. Query system.
AR-36 Security Tracing Anonymity In Wireless Mesh Networks
M. B. Mukesh Krishnan1 and T. Balachander
2
1Assistant Professor, Department of Information Technology
SRM University, Chennai - 603 203. [email protected] 2Assistant Professor, Department of Computer Science and Engineering
SRM University, Chennai - 603 203. [email protected]
Abstract: Wireless Mesh Networks (WMN) is known for its low investment feature and
promising technology for both the client and the service providers. Nowadays almost all
connections are made through wireless networks, since it is cheap and less time consuming. As a
matter of fact, it also has its own limiting criteria. It faces issues like anonymous activities in a
network domain, spoofing attack, eavesdropping etc. Out of these issues, tracing down the
anonymous activities in a wireless network is a challenging task, which is in turn is our major
concern. Eradicating anonymity in a single step is not possible, hence in order to limit it to a
certain extent, a secured architecture tracing anonymity has been proposed. This architecture
makes use of the pseudonym generation technology to identify its authorized users. It also has a
ticketing system which makes use of the common network IP security protocols like
authentication and validation system to allot a defined session time for every authorized users
working inside the secured network. This is in turn will help in the process of limiting the
misbehavior rate in a wireless network. Also it will facilitate less storage on the database, since
only user activities alone are logged and not the errors encountered. The pseudonym that has
been generated for every user is known only to the server and it remains unknown to the client.
Keywords: Security, Wireless Mesh Network, Attacks, Architecture.
AR-37 Development of a Concordance for Sanskrit using Rule-based approach
V. Sethuram1, K. Samkeerthy
2 and Dr. R. J. Rama Sree
3
1Teaching Assistant, 2Technical Assistant, 3Professor, Dept. Computer Science
Rashtriya Sanskrit Vidyapeet, Tirupati.
Abstract: A concordance is a list of examples of a particular word, part of a word or
combination of words, in its contexts drawn from a text corpus. The search word is sometimes
also referred to as a keyword. The most common way of displaying a concordance is by a series
of lines of keyword in context (KWIC). KWIC is an acronym for Key Word In Context, the
most common format for concordance lines. A KWIC index is formed by sorting and aligning
the words within an article title to allow each word (except the stop words) in titles to be
searchable alphabetically in the index. It is a useful indexing method for technical manuals
before computerized full text search became common. Concordance software enables to
discover patterns that exist in natural language by grouping text in such a way that they are
clearly visible. The present work is concerned with the development of a concordance for
Sanskrit using Rule-based approach. The tool was well tested and the results are satisfactory.
Keywords: Concordance, Rule-Based Approach, KWIC.
AR-38 Stanford POS Tagger
G. Prasanna1, A. Vinaya simha
2 and Dr. R. J. Rama Sree
3
1Teaching Assistant, 2LDC, 3Professor, Dept. Computer Science Rashtriya Sanskrit Vidyapeet, Tirupati.
Abstract: Part-of-speech tagging (POS tagging or POST) is the process of marking up a word in
a text (corpus) as corresponding to a particular part of speech, based on both its definition, as
well as its context i.e. relationship with adjacent and related words in a phrase, sentence,
or paragraph. Classical parts of speech are noun and verb, and a few others, but nowadays Part of
Speech tag sets sub-divide these general word classes into smaller ones, such as proper names,
singular nouns, mass nouns and plural nouns. Part of Speech tag sets typically contain from a
little over twenty to more than a few hundred of different word classes. PoS tagging is a non-
trivial task because most words are ambiguous. They can belong to more than one class the
actual class depends on the context of use. The present work is concerned with the
implementation of Sanskrit language. The implementation is concerned with training of Sanskrit
annotated text and to test the new texts for assigning suitable tags to each of the text. The results
are satisfactory and outputs verification indicates that the annotated text is reliable.
Keywords: POST, Sanskrit POS tagger, PoS tagging.
AR-39 Clogging Control by Using Congestion Free Routers
Thodeti Srikanth, Research Scholar, Ph.D. (Computer Science), C.M.J.University
Meghalaya , INDIA. [email protected]
Abstract: The Internet‟s excellent scalability and robustness result in part from the end-to-end
nature of Internet congestion control. End-to-end congestion control algorithms alone, however,
are unable to prevent the clogging collapse and unfairness created by applications that are
unresponsive to network congestion. To address these maladies, we propose and investigate a
novel congestion-avoidance mechanism called Congestion Free Router (CFR). CFR entails the
exchange of feedback between routers at the borders of a network in order to detect and restrict
unresponsive traffic flows before they enter the network, thereby preventing clogging within the
network.
Keywords: CFR, TCP, UDP, ECSFQ
AR-40 Study on Dimensionality Reduction Techniques and Applications
G. N. Ramadevi1 and K. Usha Rani
2
1Research Scholar, 2Associate Professor, Department of Computer Science, SPMVV, Tirupati.
Abstract: Data is not collected only for data mining. Data accumulates in an unprecedented
speed. Data preprocessing is an important part for effective machine learning and data mining.
Data mining is discovering interesting knowledge from large amounts of data, which is the
integral part of the KDD, which is the overall process of converting raw data into useful
information. Dimension reduction can be beneficial not only for reason of computational
efficiency but also because it can improve the accuracy of the analysis. The set of techniques that
can be employed for dimension education can be partitioned in two important ways: they can be
separated into techniques that apply to supervised or unsupervised learning and into techniques
that either entail feature selection or feature extraction. In this paper on overview of dimension
reduction techniques based on this organization is presented and respective techniques in each
category is described.PCA is to reduce the dimensionality of the dataset without losing the data.
PCA is applied before clustering the data and the result of the clustering using PCA is more
accurate and time taken to reduce the data is substantially reduced.
Keywords: Dimensionality Reduction, Feature selection, Feature Extraction, PCA, PC and EM
clustering.
AR-41 Ad Hoc Routing for Bluetooth Using Epidemic Algorithm
A. Sai Suneel, Lecturer, Department of ECE, School of Engineering and Technology
SPMVV, [email protected]
Abstract: In an ad hoc network connection establishment is done to secure a path for routing
packets from source to destination. This path is then maintained to secure further transmissions.
In the case of Wireless Personal Area Networks (WPAN) which are more flexible, this is not
usable. Some constraints in Bluetooth demand a more flexible on-demand ad hoc network
compared to other types of ad hoc network protocols. Initially found that creating a scatternet is
not practically possible using Bluetooth version 1.1 as the slave/slave bridge is not implemented
into the hardware. In this paper, we present an Epidemic Algorithm to make it better suited for
Bluetooth routing. Distributing information within networks can be complicated if hosts have
only limited knowledge of the properties of the network. This leads to problems when it is highly
important that specific information has to reach one particular host or all hosts within the entire
network. Epidemic algorithms follow the paradigm of nature by applying simple rules to spread
information by just having a local view of the environment. According to this fact, these
algorithms are easy to implement and guarantee message propagation in heterogeneous and not
all the time coherent environments.
Keywords: Epidemic Algorithm, Bluetooth routing, Wireless Personal Area Network.
AR-42 Resolving Application Development Issues using SOA
Y. Kiran Kumar, G. Sujatha and G. Jagadeesh Kumar
Asst Professors, Dept of MCA, SVEC, A. Rangampet. [email protected], 9885631327 [email protected], 9989277158, [email protected], 9618261060
Abstract: SOA is an architectural style for building software applications that use services
available in a network such as the web. Distributed service-oriented architectures allow system
architects to create a distributed environment in which any number of applications, regardless of
geographical location, can interoperate seamlessly in a platform and language neutral manner.
Service-oriented architecture (SOA) is a set of principles for designing extensible, federated and
interoperable services, and it represents a new evolutional spiral in the program-applications
development and in the evolution of the information systems concept. Development, evolution
and maintenance of SOA-based systems demands rethinking of the traditional roles for
performing these activities. The key objective of this paper is to present preliminary ideas on the
roles required for developing, evolving and maintaining SOA-based systems.
Keywords: Service Oriented Architecture, Distributed services, Web Services, Modular
Programming, Web Applications, Software as a Service.
AR-43 Analyzing the Detection of Active Attacks in MANETs
P. Nirupama1 and G. M. Padmaja
2
1Associate Professor & HOD, CSE Dept, SIET. [email protected] 2Senior Assistant Professor, CSE Dept, BVRIT. [email protected]
Abstract: In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad
hoc network applications are deployed, security emerges as a central requirement. A
particularly devastating attack is known as the active attack, where two or more malicious
collision nodes create a higher level virtual tunnel in the network, which is employed to
transport packets between the tunnel end points. These tunnels emulate shorter links in
the network. In which adversary records transmitted packets at one location in the network,
tunnels them to another location, and retransmits them into the network. An Active
attack is possible even if the attacker has not compromised any hosts and even if all
communication provides authenticity and confidentiality. In this paper, we analyze ac t ive
attack nature in mobile ad hoc and sensor networks and existing methods to detect active
attacks without require any specialized hardware. This method provides an ability in
establishing a way to reduce the rate of refresh time and the response time to become
more faster.
Keywords: Mobile ad hoc network, Sensor network, active attack.
AR-44 Modeling an Expert System for Diagnosis of Gestational Diabetes
Mellitus Based on Risk factors
K. Vijaya Lakshmi1, E. Sreedevi
2 and Prof. M. Padmavathamma
3
Department of Computer Science, S.V. University, Tirupati.
[email protected] , [email protected], [email protected]
Abstract: Diabetes is a chronic illness that requires continuous medical care in patient self
management education to prevent acute complications. Gestational diabetes mellitus (GDM) is
present in around 3-4% of all pregnancies. This paper proposes a methodology to identify the
GDM in pregnant women. As many researchers contributed their work in diagnosing the diabetes
mellitus. Our proposed work focuses on modeling an expert system to diagnose GDM using
Feedforward Neural Network architecture.
Keywords: Diabetes, GDM, OGTT, Expert systems, Feedforward Neural Network.
AR-45 Binary Tree Structure Approach Based Digital Watermarking
S. B. Sridevi, Lecturer, Department of ECE, School of Engineering and Technology, SPMVV, Tirupati.
Abstract: A watermarking technique embeds information into a image with virtually
imperceptible modification of the image. In this, we propose a new lossless data hiding method
where distortion occurs due to data embedded can be completely removed from the watermarked
image after the watermark has been extracted and an binary tree structure approach to solve
the problem of communicating pairs of peak points in histogram is used. Distribution of pixel
differences is used to achieve large hiding capacity while keeping the distortion low. We adopt
a histogram shifting technique to prevent overflow and underflow. Performance comparison
with other existing schemes are provided to demonstrate the superiority of the proposed scheme.
Keywords: Image authentication, Histogram modification, Reversible Data Hiding. AR-46 Mobility scenario-based Performance Evaluation of Preemptive
DSR Protocol for MANET
K. Sangeetha Supriya1 and Y. Mohana Roopa2
1Asst.Professor, 2Associate Professor & HOD, Dept. of CSE, Annamacharya Institute of Tech. & Sci., Tirupati.
[email protected], [email protected]
Abstract: Ad hoc wireless networks are characterized by multi-hop wireless connectivity,
infrastructure less environment and frequently changing topology. To analyze the performance of
routing protocols in MANETs in the real world, a scenario based simulation analysis is required
since there is a lack of necessary infrastructure for their deployment. Most of the earlier work
done in this field have assumed the Random Waypoint model, which fails to capture the realistic
movement of the nodes. In this paper, we describe a set of experiments conducted to analyze the
performance of the Preemptive DSR routing protocol in a battlefield scenario. BonnMotion
Software(Java based) is used to create and analyses mobility scenarios. Initially an explanation
of the experimental metrics and the setup is described, followed by the scenarios used for our
simulations. The results give an idea of how the Preemptive DSR protocol behaves in the given
scenario and helps identify the metrics for optimal performance of the protocol.
Keywords: MANET, PDSR, battlefield scenario, Packet Delivery Ratio, delay.
AR-47 Multimodal Biometrics – An Overview
V. Sireesha1 and Dr. K. Sandhya Rani
2
1Research Scholar, 2Professor, Dept of Computer Science, SPMVV, Tirupati. [email protected], [email protected]
Abstract: Confidentiality is very important for every organization. Now a days, Biometric
technologies have became a foundation for identification and personal verification. Biometric
refers to technologies that measure and analyze the physiological characteristics of a human
body for verification or identification. Most Biometrics are unimodal, which rely on single
source of information for authentication. But these systems are facing variety of problems such
as Noise in sensed data, Non-universality, Spoof attacks, Distinctiveness. To overcome these
drawbacks a new research area multimodal biometrics is emerged. Multimodal biometric
systems consist of combining two or more biometric modalities in a single identification system.
As multimodal biometric systems depend on multiple sources of information, these are
categorized into six classes like Multi sensor systems, Multi algorithm systems, Multi instance
systems, Multi sample systems, Multi modal systems and Hybrid systems. In this paper, an
overview of multimodal biometrics and various fusion mechanisms are discussed.
Keywords: Biometrics, Unimodal, Multimodal, Fusion.
AR-48 A Privacy Preserving Clustering Method Based on Fuzzy
Approach and Random Rotation Perturbation
M. Naga lakshmi1 and Dr. K. Sandhya Rani
2
1Research Scholar, 2Professor, Dept of Computer Science, SPMVV, Tirupati. [email protected], [email protected]
Abstract: Individual privacy issues arise in these days when organizations are using clustering as
a data analysis tool. Private and sensitive data available in criminal, healthcare and financial
records need to be preserved and also avoid the privacy leakage with the data mining system. In
this paper, a privacy preserving clustering method is proposed for protecting the underlying
sensitive attribute values when sharing the data for clustering over centralized data. The
proposed method is based on the concept of fuzzy logic and random rotation perturbation. This
approach ensures secrecy of confidential numerical attributes without losing accuracy in
clustering results. The experiments demonstrate that the proposed method is effective and
provides a feasible approach to balance privacy and accuracy.
Keywords: Privacy preserving clustering, Fuzzy membership function, Data Perturbation, Data
Mining.
AR-49 A Survey on various Pattern recognition methods for the
Identification of a different types of Images
Ms. V. Sucharita1
and Dr. S. Jyothi2
1Research Scholar, 2Professor, Dept. of Computer Science, SPMVV, Tirupati.
[email protected], [email protected]
Abstract: The main aim of this paper is to discuss and compare some aspect of pattern
recognition, and identify research topics and applications which are at the forefront of this
exciting and challenging field. The primary goal of pattern recognition is supervised or
unsupervised classification. More recently, neural network techniques and methods imported
from statistical learning theory have been receiving increasing attention. The design of a
recognition system requires careful attention to the following issues: definition of pattern classes,
sensing environment, pattern representation, feature extraction and selection, classifier design
and learning, selection of training and test samples and performance evaluation. In the area of
research and development in this field, the general problem of recognizing complex patterns with
arbitrary orientation, location, and scale remains unsolved. New and emerging applications, such
as data mining, web searching, retrieval of multimedia data, face recognition, and cursive
handwriting recognition, require robust and efficient pattern recognition techniques.
Keywords: pattern recognition, classification, feature extraction, neural networks.
AR-50 Secure Data Transfer Using Audio Steganography – A Survey
T. Anuradha1 and Dr. K. Usha Rani
2
1Head, Dept. of computer Science, J.K.C.College, Guntur. [email protected]
2Asso.Professor, Dept. of Computer Science, SPMVV, Tirupati. [email protected]
Abstract: Data security is becoming very important part of our life now-a-days. Data
transmission in public communication system is not secure because of interception and improper
manipulation by eavesdropper. So, the solution for this problem is Steganography, which is the
art and science of writing hidden messages in such a way that no one, apart from the sender and
intend recipient, suspects the existence of the message. Audio steganography is the scheme of
hiding the existence of secret information by concealing it into another medium such as audio
file. In this paper we mainly discuss different types of audio steganographic methods, advantages
and disadvantages.
Keywords: Steganography, Cryptography, Audio Steganography, Least Significant Bit, Data
Hiding.
AR-51 Quality of Service Aware Dynamic Web Service Composition
P. Rajasekar and C. M. T. Karthigeyan
Assistant Professors, SRM University, Chennai - 603 203, India
[email protected], [email protected]
Abstract: DWSC (Dynamic Web Services Composition) is growing rapidly now a days. DWSC is
more useful in all types of commercial departments with all facilities requirement based on
Dynamic Web Service providers. DWSC is more necessary for the research to the modern
generation. Through the research DWSC is more useful in acting rapidly and protecting in the field
of commerce and communication. BPEL (Business Process Execution Language) is very useful
for developing DWSC for all sorts of business super fast and sent percent safely without time delay
throughout a universal wide. So, BPEL is very useful in now a days. BPEL is to create, access and
to document automatically. Due to the research information and news formed by new framework
of Peer-to-Peer (P-to-P or P2P) environment using QoS (Quality of Services). BPEL can be
transferred any part of universal creation, access and documentation between the closed
communication so that the search and discovery of services. The framework P2P is cyber link
connected to all types Business solution automatically. The entire works is used for QoS enhanced
safety and security services. The QoS is used for similar services among the closed
communications so that the search and discovery of services are rapidly with safe and security.
AR-53 Analysis Of (2,2) Visual Cryptographic Scheme
M. Nirupama Bhat1 and Dr. K. Usha Rani
2
1Research Scholar, 2Associate Professor, Dept. of CS, Sri Padmavathi Mahila Visvavidyalayam, Tirupati.
Abstract: Visual Cryptographic schemes are one of the secret sharing schemes where a secret in
the form of image is encoded into required number, n of shadow images called shares and
distributed among n participants. This secret can be revealed 'visually only when these shares are
stacked together one on the other. In secret sharing process is a very secured process as the
secret is highly maintained .Depending on the algorithm used, the storage, the resolution and the
contrast of the reconstructed image will be changed. This paper is a study of a (2,2) visual
cryptographic scheme and the analysis of secrecy, resolution and contrast in the original and
stacked image. Though the recover of the secret can be done without using cryptographic
techniques and complex algorithms, an effort is made to restore back the quality of the stacked
image. This will be useful when scanned documents are transmitted as shares and can be
recovered back conveniently.
Keywords: visual cryptography, pixel expansion, contrast, security.
AR-54 Contrast Stretching Enhancement Techniques for Acute Leukemia Images
V. Raja Rajeswari and N. Ramesh
Faculty, Dept of ECE, School of Engineering and Technology, SPMVV, Tirupati. [email protected], [email protected]
Abstract: Leukemia is a cancer of the blood cells. When people affected with Leukemia, the
bone marrow starts to generate a lot of abnormal white blood cells. They do not work like normal
white blood cells, grow faster than normal cells, this can lead to serious problems. Leukemia
affects people in any age either they are children or adults. The screening system guidlines the
leukemia patients to determine the abnormal levels of white blood cells. Therefore, medical
professionals use medical images to diagnose leukemia. However, sometimes results show false
diagnosis because of blurness and effect of unwanted noise on leukemia images. In such
situations, the image processing such as image enhancement techniques are needed to improve
the quality of leukemia images. This paper proposes several contrast stretching image
enhancement techniques such as bright, dark, global, local and partial methods. All these
enhancement techniques are applied on the ALL (Acute Lymphocyclic Leukemia) images and
AML (Acute Myelogenous Leukemia) images. Results are observed for several images and Peak
Signal to Noise Ratio (PSNR) is calculated. All the proposed image enhancement techniques are
carried to find out best technique for enhancing the Acute Leukemia images. Based on the
results, the partial contrast stretching method is considered as the best technique that helps to
improve quality of the image.
Keywords: Acute Lymphocyclic Leukemia, Acute Myelogenous Leukemia, PSNR, bright contrast
stretching, dark contrast stretching, global contrast stretching l, local contrast stretching and
partial contrast stretching.
AR-55 Removing an Unnecessary Barrier in the Composite Object Data Model
M. Ravi Prasad, HOD of MCA, Sri Sai College of IT & Mgmt, Kadapa. [email protected]
Abstract: OLAP and object data models represent different logical concepts and structures, and
therefore separate database systems with different query languages were developed based on
these models. We show in this paper that it is desirable and possible to combine these models to
represent realistic modeling requirements. We define in this paper an OLAP Object data model
that combines the main characteristics of OLAP and Object data models in order to represent
their functionalities in a common framework. We use three different types of object classes:
primitive, regular and composite. In the OLAP-Object data model, primitive and regular classes
which represent object structures can be used for form composite classes that represent OLAP
structures. We define a query language that uses path structures to facilitate data navigation and
data manipulation. The proposed language uses the concept of an anchor. An anchor is an object
class (primitive, regular or composite) that is selected as a starting node from which paths
structures can be formed to express queries. The power of the proposed query language is
illustrated through numerous examples. The syntax and semantics of the proposed language are
developed.
AR-56 Energy Efficient Zone Disjoint Shortest Multipath Routing Protocol
K. Muralidhar1 and Dr. N. Geethanjali
2
1Research Scholar, 2Associate Professor & Head, Dept. of Computer Science & Technology
Sri Krishnadevaraya University, Anantapur-515002.
Abstract: Energy in mobile adhoc networks is of much important. Similarly shortest path from
source to destination is also important for routing. Several routing protocols for MANETs have
been proposed. Most of the existing routing protocols are single routing path between source and
destination nodes. This results in rapid depletion of battery power of the nodes that comprise the
path between the source and destination nodes and on the other hand the devices in mobile ad-
hoc network have limited power. The proposed protocol overcomes these drawbacks by
following a hybrid approach to routing of data packets by establishing Energy efficient zone
disjoint shortest multipaths between the source and destination zones by avoiding paths with
nodes that have a shorter lifetime remaining, since the nodes‟ residual energy is important in
determining the path to successfully complete data transfer without interruption and also
avoiding paths with many hopes, which delays the delivery of packets. The proposed protocol is
based on the zone disjoint multipath routing protocol (ZMR). The packets are encrypted by using
a symmetric cryptosystem. As this is a multipath protocol, it shifts the route without further
overhead, delay and loss of packets. Simulation results shows that the proposed protocol
EEZDSM performs well compared to existing ZMR and provide a reliable, energy efficient and
effective approach for routing packets in MANETs.
Keywords: Energy Efficient, Non-overlapping zone, Zone based Hierarchial Link state routing
protocol, Zone disjoint routing protocols, Hybrid routing protocol, residual energy, shortest
multipath.
AR-57 Neuro-Fuzzy Systems and Applications – A Review
K. Vijaya Sri1 and Dr. K. Usha Rani
2
1Research Scholar, 2Associate Professor, Department of Computer Science, SPMVV, Tirupati. [email protected], [email protected]
Abstract: This paper presents an introduction to modelling the non-linear systems by using novel
methods of Soft Computing. It lists the principal variants of soft computing. One of the wide
areas of research related to hybrid systems in Soft Computing i.e., Neuro-Fuzzy method is
focused and its methodology is specified. Nuero-Fuzzy Systems are applied over various
domains and resulted with accurate results. A review on different methods and models used in
framing a Neuro-Fuzzy system with various applications are presented in this paper.
Keywords: Computational Intelligence, Soft Computing, Hybrid Systems, Neuro-Fuzzy Systems.
AR-58 Wireless Networks: A Comparison and Classification based on
Outlier Detection Methods
T. Kavitha1 and A. Chandra
2
1Department of Computer Science and Systems Engineering, SVEC, A. Rangampet, Tirupati.
[email protected], [email protected]
Abstract: Outlier detection has been used for centuries to detect and, where appropriate, remove
anomalous observations from data. Outliers arise due to mechanical faults, changes in system
behavior, fraudulent behavior, human error, instrument error or simply through natural
deviations in populations. Their detection can identify system faults and fraud before they
escalate with potentially catastrophic consequences. It can identify errors and remove their
contaminating effect on the data set and as such to purify the data for processing. The original
outlier detection methods were arbitrary but now, principled and systematic techniques are used,
drawn from the full gamut of Computer Science and Statistics. In the field of wireless sensor
networks, measurements that significantly deviate from the normal pattern of sensed data are
considered as outliers. The potential sources of outliers include noise and errors, events, and
malicious attacks on the network. Traditional outlier detection techniques are not directly
applicable to wireless sensor networks due to the multivariate nature of sensor data and specific
requirements and limitations of the wireless sensor networks. In this paper we provide a
comprehensive overview of existing outlier detection techniques specifically developed for the
wireless sensor networks. Additionally, it presents a technique-based taxonomy and a decision
tree to be used as a guideline to select a technique suitable for the application at hand based on
characteristics such as data type, outlier type and outlier degree.
AR-59 HONEY POTS: A New Mechanism for Network Security
A. Chandra and K. Lalitha
Department of Computer Science and Systems Engineering, SVEC, A. Rangampet, Tirupati
[email protected], [email protected]
Abstract: Honey pots allow us to turn the tables on the bad guys. A honeypot is used in the
area of computer and Internet security. It is a resource, which is intended to be attacked and
computerized to gain more information about the attacker, and used tools. One goal of this
paper is to show the possibilities of honeypots and their use in research as well as
productive environment. Compared to an intrusion detection system, honeypots have the
big advantage that they do not generate false alerts as each observed traffic is suspicious,
because no productive components are running in the system. So in this paper we discuss about
honeypots a method for providing network security and briefly about firewalls.
AR-60 Effective Implementation of Query Optimization Through
Performance Tuning Techniques on Web
P. Jyotsna1, P. Sunil Kumar Reddy
2 and Prof.P.Govindarajulu
3
1,2 Dept of Computer science,S.V.University, Tirupati.
[email protected], [email protected], [email protected]
Abstract: This study focuses on the advent of the Internet and the Web and to connect
information sources across all types of boundaries where information sources include databases,
XML documents, and other unstructured sources. This study highlights uniformly querying those
information sources and implementing Query Optimization techniques. Since the Information is
scattered in the Web, querying the sources forms the basis to improve efficiency to retrieve
information which can be done through Query Optimization. In this paper, we survey the current
research on fundamental problems to efficiently process queries over Web data integration
systems. Optimization techniques handle different dimensions of information like volatility,
heterogeneity and autonomy which form the case for information retrieval. This study outlines
framework for evaluating such information through Query optimization techniques.
Keywords: Query Optimization, Data Integration, OODBMS, Information retrieval, Database
Management Systems, Performance tuning, Object Query Language, Stack based approach,
Relational databases.
AR-61 A Novel Dynamic Route Selection Algorithm
for Secure Data Transmission
B. Muneendra Nayak1, Dr. V. Ragunatha Reddy
2 and Dr. E. Madhusudhana Reddy
3
1C.Lecturer, Dept of Engineering, SVPPPC(TTD), Tirupati. [email protected] 2Assistant Professor, Dept. of Computer Science, SKU, Anantapur. [email protected]
3Professor, Dept. of CSE, MITS, Madanapalle. [email protected]
Abstract: Security has become one of the major issues for data communication over wired and
wireless networks and also providing a two way shortest path routing in wireless networks.
Different from the past work on the designs of cryptography algorithms and system
infrastructures, we will propose a dynamic routing algorithm that could randomize delivery paths
for data transmission. In this paper, we propose two techniques that reduce the discretization
errors, which allow faster algorithms to be designed. Reducing the overhead of computing
constrained shortest paths is practically important for the successful design of a high-throughput
QoS router, which is limited at both processing power and memory space
Keywords: cryptography algorithms, constrained shortest paths, QoS routing.
AR-62 Reducing the Correcting Cost of Faulty Nodes in Externally
Managed Overlay Networks
V. L. Pavani1 and Dr. B. Sathyanarayana
2
1Assistant Professor, Department of MCA, Intell Engineering College, Anantapur. 2Professor, Department of Computer Science, S.K.University, Anantapur.
Abstract: An end-to-end approach of inferring probabilistic data forwarding failures is
considered in an externally managed overlay network. The overlay nodes are independently
operated by various administrative domains. The optimization goal is to minimize the expected
cost of correcting all faulty overlay nodes that cannot properly deliver data. The correcting cost
includes diagnosing and repairing. A candidate node should be first checked which is identified
using a potential function instead of first checking the most likely faulty nodes as in conventional
fault localization problems. Several efficient heuristics are proposed for inferring the best node to
be checked in large-scale network. It is shown by extensive simulation that the best node can be
inferred in at least 95 percent of time, and that first checking the candidate nodes rather than the
most likely faulty nodes can decrease the checking cost of correcting all faulty nodes. The
correct location of the candidate node that can be checked first is shown.
AR-64 A Hierarchical Pattern Matching Algorithm by Using Intrusion
Detection System
E. Gayathri1 and Dr. N. Geethanjali
2
1Assistant Professor, Department of MCA, Intell Engineering College, Anantapur. 2HOD, Department of Computer Science, S.K .University, Anantapur.
Abstract: Detection engines capable of inspecting packet payloads for application-layer network
information are urgently required. The most important technology for fast payload inspection is
an efficient multi pattern matching algorithm, which performs exact string matching between
packets and a large set of predefined patterns. This paper proposes a novel Enhanced
Hierarchical Multi pattern Matching Algorithm (EHMA) for packet inspection. Based on the
occurrence frequency of grams, a small set of the most frequent grams is discovered and used in
the EHMA. EHMA is a two-tier and cluster-wise matching algorithm, which significantly
reduces the amount of external memory accesses and the capacity of memory. Using a skippable
scan strategy, EHMA speeds up the scanning process. Furthermore, independent of parallel and
special functions, EHMA is very simple and therefore practical for both software and hardware
implementations. Simulation results reveal that EHMA significantly improves the matching
performance. The speed of EHMA is about 0.89-1,161 times faster than that of current matching
algorithms. Even under real-life intense attack, EHMA still performs well.
AR-65 Data Transformation Services
P. S. Sailaja Lecturer, Dept. of Computer Science, SPW Degree & PG College, Tirupati.
Abstract: In recent years, databases have become an important area of information processing,
and it is easy to foresee that their importance will rapidly grow. Databases and database systems
have become an essential component of everyday life in modern society. A database may be
generated and maintained manually or it may be computerized .A computerized database may be
created and maintained either by a group of application programs written specifically for that
task or by a database management. A database management system is a collection of programs
that enables users to create and maintain a database. It is general purpose software system that
facilities the processes of defining, constructing and manipulating databases for various
applications. Nowadays, database management system is used in different types of applications
such as managing records of organizations, industries, schools, institutes and shops. There
applications are offline applications. However it also provides data to online applications. These
online applications are software which is totally dependent on the internet and networking
features. The paper mainly deals with Data Transformation Services is a very powerful yet easy
to use data movement facility that can transfer data. It enables data movement between data
sources. Data Transformation Service is an innovative data base migration product that easily
converts data from one database to another. Manually converting data from one database to
another is risky and it takes long period of time. By using Data Transformation Services, we
convert the tables from one databases to another with less time, more accuracy and error free.
AR-66 Data on The Road in Intelligent Transportation Systems
Kumbham Bhargavi and Dr. S. Jyothi Research Scholar, Professor, Dept. of Computer Science, SPMVV, Tirupati.
Abstract: Advances in wireless technology and mobile computing have provided a major
impetus towards development of mobile Ad-hoc Network. This networks are self organizing
networks comprised of wireless nodes that co– operate in order to dynamically establish
communication. In this paper we Propose an opportunistic approach to resource (parking slot,
taxi-cab customer, etc.) dissemination, in which an object propagates the resources it carries to
encountered objects, and obtains new resources in exchange. For example, an object finds out
about available parking spaces from other objects. These spaces may either have been vacated by
these encountered objects or these objects have obtained this information from other previously
encountered ones. Thus the parking space information transitively spreads out across objects
.Similarly, information about an accident or a taxi cab customer is propagated transitively. The
approach can also be used in dissemination of resources among pedestrians. The target of the
design is to connect different moving devices together, wirelessly in an small geographical Area.
AR-67 Augmented Reality Based Approach In Educational Field Using AR Books
D. Abhishekh1, B. Ramakantha Reddy
2 and R. Raja Kumar
3
1,2Assistant Professor, Dept. of CSE, SV College of Engineering, Tirupati.
3Assistant Professor, Dept. of CSE, SV College of Engineering for women, Tirupati.
[email protected], [email protected], [email protected]
Abstract: Technological advances enable the use of innovative tools in education. Augmented
reality in education enables interactive way of learning in field of education. Augmented reality
(AR) is a technology which combines real world with virtual object in a real 3D. AR made it
evolution from virtual reality. A virtual object is augmented into the real world and it interacts
with the real world. It is a form of experience where a computer generated virtual object is
enhanced in real world. Recent developments in augmented reality explores its impact on society
and in education which made a new way of stimulating learning with a computer generated
models enhanced in real world and with its animation support explaining tough concepts in easy
way which gives an attention-grabbing learning platform for students. This paper mainly focus
on generation of AR books which made the learning environment exciting with this new level of
technology.
Keywords: Augmented reality, virtual reality, education, 3D, AR books.
AR-68 Relevance Feedback for Content Based Image Retrieval
Based on Multitext on Histogram and Microstructure Descriptor
Kranthi Kumar. K1, Dr. T. Venu Gopal
2 and M. Rama Krishna
3
1Assistant Professor, Department of IT, SNIST, Yamnampet, Ghatkesar, Hyderabad.
[email protected] 2Associate Professor, Department of CSE, JNTUH College of Engineering, Kondagattu, Karimnagar.
[email protected] 3Assistant Professor, Department of CSE, SNIST, Yamnampet, Ghatkesar, Hyderabad.
Abstract: Image retrieval is an important topic in the field of pattern recognition and artificial
intelligence. There are three categories of image retrieval methods: text-based, content-based and
semantic-based. In CBIR, images are indexed by their visual content, such as color, texture,
shapes. A new image feature detector and descriptor, namely the micro-structure
descriptor(MSD) is discussed to describe image features via micro-structures. The micro-
structure is defined based on the edge orientation similarity, and the MSD is built based on the
underlying colors in micro-structures with similar edge orientation. Content-based image
retrieval (CBIR) is the mainstay of image retrieval systems. To be more profitable relevance
feedback techniques are incorporated into CBIR such that more precise results can be obtained
by taking user‟s feedbacks into account. The semantic gap between low-level features and high-
level concepts handled by the user is one of the main problems in image retrieval. On the other
hand, the relevance feedback has been used on many CBIR systems such as an effective solution
to reduce the semantic gap. The gap is reduced by using the Multitexton Histogram descriptor. In
this paper, a novel framework method called Relevance Feedback is used to achieve high
efficiency and effectiveness of CBIR in coping with the large-scale image data. For that reason
this paper proposes a method of relevance feedback based on Multitexton Histogram descriptor
to represents the effective feature representations, and the Microstructure descriptor (MSD) for
efficient feature extraction of an image. By using this method, high quality of image retrieval on
Relevance Feedback can be achieved in a small number of feedbacks. In terms of efficiency,
iteration of feedback is reduced substantially by using the navigation patterns discovered from
the user query log, which reduce the computational processing time.
Keywords: CBIR, Relevance Feedback, Semantic Gap, Microstructure descriptor (MSD),
Multitexton Histogram descriptor.
AR-69 Information Technology Related Innovations in Every Business Function
K. Divya Faculty, Dept. of Communication and Journalism, SPMVV, Tirupati. [email protected]
Abstract: Information Technology (IT) is now being viewed as an organizational core
competency that is necessary for organizations to survive in this competitive world. IT
applications have enabled organizations across the world to work in an effective and efficient
manner. IT applications have changed the nature of the work place. From multi-national
corporations who maintain mainframe systems and databases to small businesses that own a
single computer, IT plays a major role. The primary reason for the increase in popularity and
utilization of Information Technology, especially in business is for its efficiency, speed, low
procurement cost and accuracy in handling of multiples tasks simultaneously. Several
Departments in business organizations such as Human Resources, manufacturing, Customer
service, sales and marketing utilize IT to carry out their respective operations in a productive
manner. It facilitates the information flow between the customers, manufacturing operations and
suppliers that certainly plays a key role in improving the efficiency and responsiveness to meet
the customer requirements. Software is an important part of IT which relates to computer
applications that enable a company to generate, store, program and retrieve data. Today there are
many software programmes are assigned in all the operations of business sectors for executing
specific task. Enterprise Resource Planning (ERP), Computer Aided Design (CAD), Electronic
Data Interchange (EDI), Point- of- sale (POS), IVRs (Interactive Voice Response)and Electronic
Commerce are some examples of different software‟s used in business. Today, if a company is
not utilising Information Technology properly means they are at risk. It can be said that IT
provides a huge range of capabilities that enhance management performance at all levels in order
to gain more profits.
Keywords: Information Technology (IT), Enterprise Resource Planning (ERP), Computer Aided Design
(CAD), Electronic Data Interchange (EDI), Point- of- sale (POS), IVRs (Interactive Voice Response) and Electronic Commerce.
AR-70 Duplicate Detection of Query results from Multiple Web Databases
G. Bala Krishna Priya, M.Sc.(Comp.Sci.), M.Phil., SPWD & PG College, Tirupati.
Abstract: Record matching, which identifies the records that represent the same real-world
entity, is an important step for data integration. Most state-of-the-art record matching methods
are supervised, which requires the user to provide training data. These methods are not
applicable for the web database scenario, where the records to match are query results
dynamically generated on-the-fly. Such records are query-dependent and a prelearned method
using training examples from previous query results may fail on the results of a new query. To
address the problem of record matching in the web databases scenario, we present an
Unsupervised, online duplicate detection method UDD, which, for a given query, can effectively
identify duplicates from the query result records of multiple web databases. After removal of the
same-source duplicates, the “presumed” nonduplicate records from the same source can be used
as training examples alleviating the burden of users having to manually label training examples.
Starting from the nonduplicate set, we use two cooperating classifiers, a weighted component
similarity summing classifier and SVM classifier, to iteratively identify duplicates in the query
results from web databases. Experimental results show that UDD works well for the web
database scenario where existing supervised methods do not apply.
AR-71 A Cloud Frame Work for Monitoring People Health
R. Nagarjuna Reddy, M.Tech., JNTUA. [email protected].
L. Narasimha Sai Kiran, M.Tech. and G. S. Prasada Reddy, M.Tech.(SE)
Abstract: There's something big happening in the healthcare industry, and it seems there is a
silver lining to this cloud. Studies say that security, regulatory and privacy concerns might get in
the way of cloud computing in the healthcare industry, although this sector is set to grow in the
medium term. Modernization in the healthcare system is going beyond Electronic Healthcare
Records (EHR). According to research firm Markets and Markets, the use of cloud computing in
healthcare will span both clinical and non-clinical applications. Apart from EHR, cloud
computing will also apply to other clinical uses, such as physician order entry and software
imaging and pharmacy use. Non-clinical uses will likewise benefit, including management apps
for patient billing, claims and revenue cycle management. According to MarketsandMarkets, the
use of cloud computing in healthcare will be greatly beneficial in sharing EHR data across
facilities in different geographic locations. Using cloud applications will ensure that patients get
treated on time, regardless of location and facility. We can use cloud services in following
scenario.
Keywords: health guides, health outreach, personal health systems, personal profile.
AR-72 A Parameterized Runtime Analysis of evolutionary Algorithm for Minimization in Euclidean TSP
G. Nagalakshmi1 and Dr. S. Jyothi
2
1Associate Professor & HOD, CSE&IT Dept., Siddhartha Institute of Science and Technology,
Puttur. 2Professor, Dept. of Computer Science, SPMVV (Women‟s University), Tirupathi.
Abstract: Although evolutionary algorithms (EAs) are widely used in practical optimization,
their theoretical analysis is still in its infancy. Up to now results on the (expected) runtime are
limited to discrete search spaces, yet EAs are mostly applied to continuous optimization
problems. So far results on the runtime of EAs for continuous search spaces rely on validation by
experiments/simulations since merely a simplifying model of the respective stochastic process is
investigated. We exploit structural properties related to the optimization process of evolutionary
algorithms for this problem and use them to bound the runtime in dependence of the number of
inner points k and shows the simple evolutionary algorithms solve the Euclidean TSP in
expected time O(n4k
(2k-1)!). Moreover, we show that, under reasonable geometric constraints, a
locally optimal 2-opt tour can be found by randomized local search in expected time O(n2k
k!).
AR-73
Comparative Study of Different Approaches of Spectral Clustering on Graphs
G. Sujatha1 and Dr K. Usha Rani
2
1Assistanat Professor, Department of MCA, Rao & Naidu Engineering College. 2Associate Professor, SPMVV, Department of Computer Science, Tirupathi.
[email protected], 2 [email protected]
Abstract: In recent years, spectral clustering algorithms have been more effective in finding
clusters than other traditional algorithms. It is simple to implement and produce high quality
clustering on small data set. The goal of this paper is to give brief idea about the different
approaches of spectral clustering on graphs.
Keywords: Spectral clustering, Graph notation, Incremental spectral clustering.
AR-74 Image Denoising Using Fusion Based Curvelts and Wavelets Transform
P. Subba Lakshmi and S. Fairoz Sulthana Faculty, Dept. of ECE, School of Engg. and Tech., SPMVV, Tirupati.
Abstract: A medical image consists of random noise which is affected during acquisition and it
spread over the image. In such situations it is very difficult to diagnose the particular disease. To
achieve the best possible diagnosis it is important that medical images must be sharp, clear and
free of noise. For this purpose, several denoising methods are developed both in spatial and
frequency domains to remove noise from digital images. Wavelets transform and curvelets
transforms are widely used methods for denoising images in frequency domain. But, wavelets
transform fail to represent efficiently singularities along the lines or curves which fail to explore
geometrical singularity of edges in images and curvelet transform method has also brought some
scratches and ringing phenomenon in the reconstructed image. In this proposed work, fusion
based curvelets and wavelets transformation methods are used to obtain the high quality images.
Results are observed for several noisy images and PSNR is calculated. From the experimental
results, this proposed fusion based curvelet and wavelet transform algorithm is well suitable for
medical images.
Keywords: Noise, Curvlet transform, Wavelet transform, Fusion, PSNR.
AR-78 A Crypto Virology: A Deadly Combination
S. Heera, P. Vaishnavi and S. Surekha
Sri Padmavathi Mahila Visvavidyalayam, Tirupati.
[email protected], [email protected]
Abstract: Understanding the possible extent of the future attacks is the key to successfully
protecting against them. Designers of protection mechanisms need to keep in mind the potential
ferocity and sophistication of viruses that are just around the corner. That is why we think that
the potential destructive capabilities of fast spreading worms like the Warhol worm, Flash worm
and Curious Yellow need to be explored to the maximum extent possible. While re-visiting some
techniques of viruses from the past, we can come across some that utilize cryptographic tools in
their malicious activity. That alarming property, combined with the speed of the so-called “super
worms”, is explored in the present work. Suggestions for countermeasures and future work are
given.
Keywords: Computer viruses, worms, cryptography, crypto virology
AR-79 Design of Low Voltage Switched Op-amp with
rail-to-rail to input common mode range
N. Kusuma1 and P. Hemachandu
2
Lecturer, SPMVV, Dept. of E&C Engineering, M.Tech-VLSI System Design (NIT-Warangal).
(Ph.d- Power Systems, S.V.University- tirupathi), Dept. of E&E Engineering. [email protected]
Abstract: With the demand of low power wireless communication applications, running circuits
with reduced supply voltage can be of great advantage. Switched capacitor circuit is well known
for their high linearity even with voltage supply variation since the capacitor value is only
dependent on the process. However, when running the switched capacitor circuit with a reduced
voltage supply, problems with the switches arise as they cease to function within a portion of the
operating voltage range. A technique called switched OpAmp is proposed as a solution. The
problematic switches are replaced with OpAmps that are capable of switching ON and OFF to
mimic the operation of the switches. This method is proven to be feasible along with some power
savings since the OpAmp is in operation for only half of the clock cycle. But much less attention
has been paid to input common mode(CM) range while working on low voltage. The input
voltage applied must fall in input CM range for proper amplification. This paper presents a
switched capacitor based attenuator (SCBA) network to extend the input CM to rail to rail for
switched opamp which is meant for working in low voltage. Modern wireless communication
systems employ various kinds of standards that can be classified in many ways. Switched
OpAmp is designed in 0.18um CMOS Process Technology.
Keywords: Low voltage, active region, forbidden region, common mode, rail to rail, threshold
voltage.
AR-80 An Improved K-means Clustering Algorithm with refined
initial Centroids
G. Pradeepini1 and Prof. S. Jyothi
2
1Associate Professor, Department of Master of Computer Applications
Rao & Naidu Engineering College, Ongole. [email protected] 2 Professor, Department of Computer Science, SPMVV, [email protected]
Abstract: A final Clustering result of the k-means clustering algorithm greatly depends upon
the correctness of the initial centroids. Generally the initial centroids for the k-means clustering
are chosen randomly so that the selected initial centroids may converges to numerous local
minima, not the global optimum. In this paper a new initialization approach to find initial
centroids for k-means clustering is proposed. According to our experimental results, the
Improved k-means Clustering Algorithm has the more accuracy with less computational time
comparatively Original k-means clustering algorithm.
Keywords: Clustering, Data Mining, Data partitioning, Initial centroids, K-means algorithm. Cluster
analysis, Data analysis.
AR-82 A Study of Semantic Web for E-Business and E-Laerning
J. Murali, Asst.Professor, SVEC, A.Rangampet, Tirupati.
Abstract: The Semantic Web Research has resulted in the last years in significant outcomes.
This Semantic Web will provide intelligent access to heterogeneous, distributed information,
enabling software products (agents) to mediate between user needs and the information sources
available. In this paper we describe some areas for application of this new technology. We focus
on ongoing work in the fields of “E-business” and “E-Learning”.
Keywords: Semantic Web, Ontologies, E-Business, and E-Learning.
AR-83 Prediction and Classification of Speech in Speech Recognition System
N. Usha Rani, Assistant Professor, Department of CSE, SVUCE,
Sri Venkateswara University, Tirupathi. [email protected]
Abstract: Speech Recognition is one of the important application areas of Artificial Intelligence.
Speech recognition is the process of converting the acoustic signals into corresponding text
transcription. Achievement of the high speech recognition accuracy is the critical factor. It is
very complex task to identify the speech spoken in different rates. Duration of the speech is one
of the most important features used to identify the speech at particular rate. The present work
focuses on the prediction of the speech using duration parameter and classifies them in to slow,
normal and fast.
Keywords: Speech Recognition, Sphinx, Hidden Markov Model (HMM), prediction and
Classification method.
AR-84 A Novel Approach for Clustering Web Services and
Rest Services Using WSDL
N. P. Shangaranarayanee1, Dr. T. Rajendran
2 and Mr. P. Krishna Sankar
3
1PG Scholar, Department of CSE, Angel College of Engineering &Technology, Tirupur-641 665, Tamilnadu.
[email protected]. 2Professor and Dean, Department of Computer Science and Engineering and Information Technology, Angel
College of Engineering &Technology, Tirupur-641 665, Tamilnadu. [email protected]. 3Assistant Professor, Department of Computer science and Engineering, Dr.Mahalingam College of
Engineering&Technology, Pollachi-642 003, Tamilnadu. [email protected].
Abstract: Today‟s life style with increasing use of web for there everyday tasks is making
service providing is an essential part for Internet customer‟s. Web services help organizations
maintain an operative presence on Internet. Service-oriented architecture (SOA) and its flagship
implementation technology known as Web services have changed way software engineers design
and develop enterprise applications. Clustering the services would greatly boost ability of web
service search engine to retrieve relevant ones with most relevant Web services. From novel
approach to new one called REST services. REST is to identify an architectural style based on a
set of principles for designing network-based software architectures. The term was extended to
describe a style of building web services based on the principles of REST. In our approach to
cluster REST services based on function and by addressability along with some form of
connectedness are embedded in WSDL definition of bindings and ports.
Keywords: REST, HTTP, RPC, HTML, SOAP, WSDL, URI, XML, W3C.
AR-85 Attacks and Challenges in Wireless Mesh Networks
K. Venkata Ravi, Research Scholar. [email protected]
P. Nageswararao, Head of CSE, SITS. [email protected] and Dr. Sanjay Kumar, Head of CSE,
Ravi Shankar Shukla University.
Abstract: IEEE 802.11s WMN is a new wireless networking technology. This is a low –cost,
multi hop wireless broadband provisioning technology. One main challenge in design of this
network is the vulnerability to security attacks. IEEE 802.11smesh router deployed in shopping
malls, university campuses, airport & other such type of locations to provide high speed Internet
to users. The WMN is vulnerable to Denial-of-Service[DoS] attacks due to the vast coverage
area and dense deployment of wireless mesh routers. DoS is the most server security threat. As
DoS can compromise the availability & integrity of the service. In this paper we identify the DoS
attacks in wireless mesh network along with possible defenses and future directions.
Keywords: Broadband networks, wireless networks, IEEE802.11s, Denial of service, Internet
Gateway.
AR-86 Data Preprocessing for efficient External Sorting
S. Hrushikesava Raju1 and Dr. T. Swarna Latha
2
1Associate Professor, Dept. of CSE, SIETK, Puttur. 2Professor, Dept. of CSE, St.Anns Engineering college, Chirala.
[email protected], [email protected]
Abstract: This paper presents external sorting using data preprocessing. Generally, huge data of
any organization possess data redundancy, noise and data inconsistency. To eliminate, Data
preprocessing should be performed on raw data, then sorting technique is applied on it. Data
preprocessing includes many methods such as data cleaning, data integration, data
transformation and data reduction. Depending on the complexity of given data, these methods
are taken and applied on raw data in order to produce quality of data. Then, external sorting is
applied. The external sorting now takes the number of passes less than actual passes log B (N/M)
+ 1 for B – way external merge sorting, and number of Input / Outputs less than 2*N* (log B
(N/M) + 1) of Input / Outputs and also involve least number of runs compared to actual basic
external sorting.
Keywords: data preprocessing, external sorting, Data Cleaning, passes, Inputs / Outputs, and
runs.
AR-91 Magnetic Resource Force Microscopy for Reconstruction of H-B
Sparse Fingerprint Image
Josphineleela. R1 and M. Ramakrishnan
2
1Research scholar, Sathyabama University, Chennai. [email protected] 2Department of Information Technology, Velammal Engineering College, Chennai
Abstract: Magnetic Resource Force Microscopy for Reconstruction of H-B Sparse Fingerprint
Image presents a Hierarchical Bayesian model to reconstruct sparse images when the
observations are obtained from linear transformations and corrupted by an additive white
Gaussian noise. Our hierarchical Bayes model is well suited to such naturally sparse fingerprint
image applications as it seamlessly accounts for properties such as sparsity and positivity of the
fingerprint image via appropriate Bayes priors. We propose a prior that is based on a weighted
mixture of a positive exponential distribution and a mass at zero. The prior has hyper parameters
that are tuned automatically by marginalization over the hierarchical Bayesian model. To
overcome the complexity of the posterior distribution, a Gibbs sampling strategy is proposed.
The Gibbs samples can be used to estimate the image to be recovered, e.g. by maximizing the
estimated posterior distribution. In our fully Bayesian approach the posteriors of all the
parameters are available. Gibbs algorithm provides more information than other previously
proposed sparse reconstruction methods that only give a point estimate. The performance of our
hierarchical Bayesian sparse reconstruction method is illustrated on synthetic and real data
collected from a tobacco virus sample using a prototype MRFM instrument.
Keywords: Gauusian noise, Bayes Model, Gibbs technique and sparse Image.
AR-93 An Elgamal Type Digital Signature Scheme
Over Circulant Matrices
B. Umaprasada Rao1, R. Mohana Ramana
2 and P. Vasudeva Reddy
3
1Dept. of Engg. Mathematics, Dr. L.B. College of Engineering (W), Visakhapatnam. 2Dept. of GEBH, Sri Vidhyanikethan Engineering College, A.Rangampet, Tirupati.
3Dept. of Engg. Mathematics, College of Engineering, Andhra University, Visakhapatnam.
Abstract: Digital signature schemes are one of the most important consequences of public key
cryptography. These schemes provide authentication, integrity, non-repudiation to digital
communications. During the last three decades many signature schemes have been proposed
using different mathematical hard problems. For example two of the most popular groups in the
discrete logarithm problem on the group of units of a finite field and the group of rational points
of an elliptic curve over a finite field.
In this paper we proposed an ElGamal like digital signature scheme using the group of
non-singular circulant matrices. We proved that this signature scheme is secure under Diffie-
Hellman problem over the group of circulant matrices. When compared with signature schemes
constructed using finite fields, this scheme offers the same level security with less computational
cost.
Keywords: Circulant Matrices, Discrete Logarithm Problem, Digital Signature Scheme.
AR-94 Wavelet Transform Based Dental Image Registration for
Aligning Dental Radiographs
Dr.Yaswanth Kumar.Avulapati1 and Dr. R. Seshadri
2
1Academic Consultant, Dept of Computer Science, S.V.University, Tirupati. 2Director, S.V.U.Computer Center, S.V.University, Tirupati.
Abstract: Biometrics is the science of establishing the identity of an individual based on their
physical, chemical and behavioral characteristics of the person. The paper presents a new method
for automatic image registration based on estimating wavelet coefficients.
The algorithm developed for the method is tested by developing a Image Registration
Tool using MATLAB. Developed algorithm has been applied on pre and post surgery periapical
dental x-ray images. Proposed method uses four level coarse to fine strategy to register the
images.
Mutual information being the maximization criterion; correlation coefficient, mean,
standard deviation and Root Mean Square Error (RMSE) are also computed for comparing the
algorithm with other algorithms. Results show that error due to proposed method is less
compared to graylevel and manual methods of registration
Keywords: Dental Image Registration Tool, Periapical images, Wavelet transform, X-rays.
AR-10 A Sharp and High Resolution Image Generation Using DWT and SWT
Kakarla Vijay and Sk. Mujafar Ahmed Dept. of ECE, ADAM‟S Engineering College, Palvancha, AP. [email protected]
Abstract: In this paper, By using DWT, SWT and Bicubic interpolation technique, we are able to
enhance the image resolution of input image by using high frequency components. DWT is
applied in order to decompose an input image into different subbands. Then the high frequency
subbands as well as the input image are interpolated by using bicubic technique. The estimated
high frequency subbands are being modified by using high frequency sub band obtained through
SWT. Then all these subbands are combined to generate a new high resolution image by using
inverseDWT (IDWT). The quantitative and visual results are showing the superiority of the
proposed technique over the conventional and state-of-art image resolution enhancement
techniques.
Keywords: Discrete wavelet transform, image super resolution, stationary wavelet transform.
AR-15 Digital License Plate Identification Kakarla Vijay
1 M.Tech. and K. Sundar Srinivas
2 M.Tech.
1Dept. of ECE, ADAM‟S Engineering College, Palvancha, AP. [email protected] 2Dept. of ECE, NCET, Jangareddygudem. [email protected]
Abstract: A Digital license plate identification (DLPI) is used in many applications and a number
of techniques have been proposed. But, many of them worked under restricted conditions, such
as fixed illumination, limited vehicle speed, designated routes, and stationary backgrounds. The
proposed DLPI technique consists of two main modules: a license plate locating module and a
license number identification module. The former characterized by fuzzy disciplines attempts to
extract license plates from an input image, while the latter conceptualized in terms of neural
subjects aims to identify the number present in a license plate. Experiments have been conducted
for the respective modules. Different images taken from various scenes and under different
conditions were employed. the identification rate of success is 95.6%, the overall rate of success
for our DLPI algorithm is 93.7%.
Keywords: Color edge detector, fuzzification, license number identification, license plate
locating, license plate recognition (LPR), self-organizing (SO) character recognition, spring
model, topological sorting, two-stage fuzzy aggregation.
AR-16 Model – RF Based Classroom Intelligence Computation K. Sundar Srinivas
1 and M. Naga Lakshmi Kalyani
2
1M.Tech., Dept. of ECE, NCET, Jangareddygudem, [email protected] 2Asst. Prof, Potti Sriramulu College of Engineering & Technology, Vijayawada, India
Abstract: This system is a contemporary one for class rooms in colleges and schools. Nowadays,
the systems were getting into digital form under this concept, information from the department
head can be displayed on the LCD screen in the classroom and this also displays the number of
students enter into the class. Parallel, this information will be data based using GSM and RF
Technology. IR sensors are used to display the count of students which are interfaced with PIC
micro controller. And this also represents the room temperature where fans can automatically
switch on based on the threshold temperature that is programmed in PIC.
Keywords: Peripheral Interface Controller (PIC), GSM, IR Sensors.
AR-23 To Analyze Performance in Reactive Routing Protocol
Using Mobile Adhoc Networks
K. Venkararamana1, S. Hemasri
2 and K. Muniramaiah
3
1Assistant Professor, Dept of CSE, ChadhalawadavenkataSubbaiah College of Engineering, Tirupati.
[email protected], 9908754752 3Assistant Professor, Dept of MCA, ChadhalawadaRamanamma Engineering college, Tirupati.
[email protected], 91 8106997999 2M.Tech.CSE [II/II], SIETK, PUTTUR. [email protected]
Abstract: Mobile Ad hoc networks(MANET) represent complex distributed systems that
comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and
temporary adhoc network topologies, allowing people and devices to seamlessly internet work in
areas with no preexisting communication infrastructure e.g., disaster recovery environments. The
goal of the routing protocol is to have an efficient route establishment between a pair of nodes.
Routing protocols used in wired network cannot be used for mobile ad-hoc networks because of
node mobility .Many routing protocols such as proactive, reactive and hybrid. Reactive routing
protocols have been found to be user friendly and efficient when compared to other routing
protocols. There are a variety of reactive routing protocols suchas AODV, DSR, LAR1, LMR,
ABR,SSI, AOMDV, MRAODV, ARA. In this study a comparison and performance evaluation
of two reactive routing protocols AODV and DSR are done using NS-2simulator to identify the
protocol that is best suited for MANET‟S.
Keywords: MANET, Routing protocols, AODV, DSR.
AR-24 To analyze difference between AODV and DSDV Routing
Protocols in MANETs 1K. Venkata Ramana
1, P.C. Devi
2 and B. Chaithanya
3
1Assistant Professor, Dept. of CSE, Chadalawada VenkataSubbaiah College of Engineering and Technology,
Tirupati. [email protected] 2M.Tech CSE [II/II], SIETK, PUTTUR. [email protected]
3Assistant Professor, Dept of CSE, Chadalawada VenkataSubbaiah College of Engineering and Technology,
Tirupati. [email protected]
Abstract: Mobile Ad hoc Network (MANET), is a self-configuring infra structure less network
of mobile devices Connected by wireless links. Each device in a MANET is free to move
independently in any direction, and will therefore change its links to other devices frequently. In
this paper we are presenting two mobile ad-hoc routing protocols DSDV and AODV. Here the
DSDV is a proactive protocol depending on routing tables which are maintained at each node.
The AODV is a reactive protocol, which find a route to a destination on demand, whenever
communication is needed. Considering the bandwidth, throughput and packet loss, in both
DSDV and AODV routing protocols, DSDV is best suited for only smaller networks and AODV
is suited for general Ad-hoc networks.
Keywords: Mobile Ad hoc Networks (MANETs), Quality of Service (QoS), AODV, DSDV,
routing.
AR-25 Determining the Positioning Algorithm for Fingerprinting using WLAN
Indu Maurya1 (M.tech, IT), Ashish Maurya
2 and Priyanka Maurya
3
1GCET, Gr. Noida. [email protected]
2Axis College, Kanpur. [email protected]
3GBU, Gr.Noida. [email protected]
Abstract: The effectiveness of Location Based Systems depends on the correct location of users
and mobile devices ,the outdoor location can be easily calculated, while using technologies such
as GPS (Global Positioning System), it is more difficult to obtain when the location scenario is
an indoor environment. Several technologies and location techniques can be used in this field.
One of these techniques is FINGERPRINTING which consists in two different phases: The first
phase is the: calibration phase: when data is collected and the Fingerprint Map is generated. The
second phase is the: on-line phase: where data collected by the mobile device and the data
collected in the calibration phase are used to estimate the location of the mobile node. Location
systems are more and more viewed as a necessary element of a WLAN system. Accuracy is the
most important issue in location system, especial in the indoor WLAN location detection. Indoor
location systems are affected by indoor environment both due to multi-path and man-made
effects. Wireless channel is more unpredictable then wired channel because of environmental
factors such as- multipath fading, shadow fading, doppler spread, delay spread, frequency offset,
time offset etc. The purpose of this thesis is to avoid the transmission of signal pattern which
might result in an unwanted regularity in the transmitted signal. For this purpose we are doing
WLAN-OFDM SIMULATION to avoid all this effects. Orthogonal frequency division
multiplexing (OFDM) is becoming the chosen modulation technique for wireless
communications. OFDM can provide large data rates with sufficient robustness to radio channel
impairments. Many research centers in the world have specialized teams working in the
optimization of OFDM for countless applications. The purpose of this report is to provide
Simulink model to simulate the basic processing involved in the generation and reception of an
OFDM signal in a physical channel and to provide a description of each of the steps involved.
Keywords: existing WLAN location method, fingerprinting, location determination technique,
orthogonal frequency division multiplexing (OFDM).
AR-35 Comparative Study of Routing Techniques, Their Attacks and
Prevention methods in MANET
MD Sirajul Huque, M.Tech. II Year CSE, 9963828634
Abstract: MANET (Mobile Adhoc Network)refers to a multihop packet based wireless network
composed of a set of mobile nodes that can communicate and move at the same time , without
using any kind of fixed wired infrastructure. Routing is a core problem in networks for delivering
data from one node to another node. Absence of infrastructure and dynamic nature of MANET
invites intruder to launch attack, one of them is flooding. The objective of this paper is to present
a comparative study of various routing protocols of MANET. And we have discussed different
types of attack that have been launch during routing between nodes.
Keywords: Mobile Ad hoc Networks (MANET), Intruder, Flooding, Routing Protocols.
AR-63 Providing Location-Aware End-to-End
Secure communication in Wireless Sensor Networks
Thota Kesava Rao1, C. Viswanadh
2 and G. Suresh
3
1M.Tech.(CSE), Siddartha Institute of Technology and Science, Puttur. 2Assistant Professor, Dept. of CSE, SITS,
Tirupati. 3Assistant Professor, Dept. of Mechanical Engineering, KMM Engineering College, Tirupati.
Abstract: Providing desirable data security, that is, confidentiality, authenticity, and availability,
in wireless sensor networks (WSNs) is challenging, as a WSN usually consists of a large number
of resource constraint sensor nodes that are generally deployed in unattended/hostile
environments and, hence, are exposed to many types of severe insider attacks due to node
compromise. Existing security designs mostly provide a hop-by-hop security paradigm and thus
are vulnerable to such attacks. Furthermore, existing security designs are also vulnerable to many
types of Denial of Service (DoS) attacks, such as report disruption attacks and selective
forwarding attacks and thus put data availability at stake. In this paper, we seek to overcome
these vulnerabilities for large-scale static WSNs. We come up with a location-aware end-to-end
security framework in which secret keys are bound to geographic locations and each node stores
a few keys based on its own location. This location-aware property effectively limits the impact
of compromised nodes only to their vicinity without affecting end-to-end data security. The
proposed multifunctional key management framework assures both node-to-sink and node-to-
node authentication along the report forwarding routes. Moreover, the proposed data delivery
approach guarantees efficient en-route bogus data filtering and is highly robust against DoS
attacks. The evaluation demonstrates that the proposed design is highly resilient against an
increasing number of compromised nodes and effective in energy savings.
AR-75 HYBRID Markov Model is used for Tracking in MANET
with Structure Free Approach
M. ChandraMouli Reddy1, K. Mahesh Kumar
2 and J. Sreekanth Reddy
3
1M.Tech, MBA,(PHD), 2,3M.Tech., VTTW, Tirupati.
Abstract: Mobile Adhoc Network does not require fixed infrastructure support for tracking to
reach a Target node. We need to accomplish a goal is to improve the effectiveness of structure –
free tracking. We already recognizes a problem of tracking of a mobile target node in a mobile
adhoc network(set-up). We includes a generic tracking framework for a online tracking
applications. We proposes a online statistically estimated hybrid estimated markov model of an
gradient based protocols of the target‟s likely direction. A PMBT is a probabilistic online tracking
algorithm that computes information utilities at each step, and then chooses the next step toward
the target based on the maximum expected utility. We provides a light weight implementation of
the state of nodes in each cell and a polite gossip mechanism for forwarding the tracking
messages. We consider a benchmark approach to solve a tracking problem in MANET, A PMBT
algorithm significantly outperforms both gradient-based and markov model with the help of polite
gossip mechanism.
Keywords: MANET, PMBT, Gradient Model, HMM, target, tracking.
AR-76 Ontology Model is Used for Gathering Multidimensional Analysis of
Web Information in Single Hierarchy
K. Mahesh Kumar1, M. ChandraMouli Reddy
2 and J. Sreekanth Reddy
3
1M.Tech., VTTW, Tirupati. [email protected] 2M.Tech., MBA(PHD), 3M.Tech., VTTW, Tirupati.
Abstract: Many models have been utilized for only a gathering knowledge from either a global
knowledge base or a user local knowledge base in a single dimensional manner.
Experimentally, Those models have been proved as an inefficient results for collecting an
accurate information. Previous Approaches shows more precision value and less recall value. It
does not successful for gathering meaningful knowledge. It occurs a replication copies of
knowledge, it does not eradicates data redundancy. An Ontology Model is proposed for
representing a user background knowledge and for personalized web information gathering. An
Ontology model is used for extracting global knowledge from personalized LCSH system
repositories and Discovering user background knowledge from the user local instance
repositories are searching in a multidimensional manner. But, information presents in a single
hierarchy. It exists a semantic relationships for gathering global information. Finally, we can
conclude that the Ontology model are significantly evaluates a substantial improvements
achieved by a F1 measure experimental results are promising an efficiency of an knowledge
discovery and it is reliable. It shows more recall value, less precision value. This model have
been proved as a Benchmark model by applying it to a common system for Hierarchical Web
information gathering.
Keywords: Ontology, personalization, semantic relations, world knowledge, local instance
repository, user profiles, web information gathering, single hierarchy, multi dimensional
mining,replication, recall, precision.
AR-77 Estimating Marketing Analysis for Customer Behaviour With the
Help of Bayesian Classification
K. Mahesh Kumar1, M. ChandraMouli Reddy
2 and J. Sreekanth Reddy
3
1M.Tech., VTTW, Tirupati. [email protected] 2M.Tech., MBA(PHD), 3M.Tech., VTTW, Tirupati.
Abstract: To stay competitive, In Marketing Sector need to develop a viable customer retention
strategy. Since a key to the successful development of such a strategy rests with customer
relationship management, Marketing Sector should identify the most profitable ways to build and
maintain a loyal customer relationship. With the Heavy competition of global market for national
and international business. Customer relationship management is a major area is used to find out
the preferences and purchases of a particular product. CRM takes the customers as the center, it
gives a new life to the enterprise organization system and optimizes the business process. In an
effort to help enterprises understand their customers‟ shopping behavior and the ways to retain
valued customers, In Previous Approaches have been proved as an unsuccessful, It does not
shows approximate result for customer shopping analysis, we consider those approaches are not
to be effective to find out hidden customer classifier pattern analysis. We propose data mining
techniques. As a rising subject, data mining is playing an increasingly important role in the
decision support activity of every walk of life. This paper mainly focused on the research of the
customer classification and prediction in commercial banks based on Naive Bayesian classifier
that accommodates the uncertainty inherent in predicting customer behavior.
Keywords: customer relationship management, customer classification and prediction, data
mining, naive Bayesian classifier.
AR-87 An efficient Fault-Tolerance Technique using Check-pointing
and Replication in Grids using Data Logs
S. Dilli Babu1, Ch. Ramesh Babu
2 and Dr. Ch. D. V. Subba Rao
3
1Dept. of CSE, SVUCE, SVU, Tirupathi. [email protected] 2Research Scholar, JNTUK. [email protected]
3Professor, Dept. of CSE, SVUCE, SVU, Tirupathi. [email protected]
Abstract: Grid computing systems are increasingly growing importance in the present world with
advances in the network technology. Grids are composed of many geographically disturbed
resources, each having its own administration domain. Grid computing involves decentralized
heterogeneous, geographically distributed resources that can work on a job together. Since the
resource availability is dynamic in nature, the grid infrastructure is prone to failure of job lose or
delay. So in order to adapt to the failure, fault tolerant mechanism must be implemented.
Commonly used techniques for fault tolerance are check pointing and load replication. To have
an efficient fault tolerance mechanism this paper comes up with an optimal check pointing
algorithm based on real-time work load logs that reduces overhead caused due to check pointing.
The proposed system uses Job replication to ensure completion of work, optimal replication and
dynamic Load balancing is used to avoid overload in any resources and to achieve maximum
resource utilization and maximize throughput.
Keywords: Grid Computing, Fault Tolerance, Work load logs.
AR-88 Comparison study of an efficient Algorithm for Discovering
Maximum Frequent Item sets
P. B. Archana1 and Dr. A. Ram Mohan Reddy
2
1II M.Tech., 2Professor and Head, Dept. of CSE, SVUCE, Tirupati.
Abstract: Max Frequent pattern mining is a essential technology and step in mining associations
rules. Max frequent item sets contain the exact information of all the frequent itemsets. This
paper proposed a fast algorithm for discovering maximum frequent itemsets called FA-DMFI
which can store attributes association information through scanning database only once. Then the
max frequent itemsets is discovered in the association matrix by means of the bottom-up and top-
down searching strategy. Therefore the algorithm execute time is reduced remarkably.
Experimental results show its effectiveness and efficiency.
Keywords: Data mining, Association rule, Max frequent itemset, Information matrix.
AR-89 A Refuge Business model for Cloud Computing using novel AES
Approach
D. Prathima1 and Dr. P. Venkata Subba Reddy
2
1II M.Tech, 2Assoc.Professor, Dept. of CSE, SVUCE, Tirupathi.
Abstract: Enterprises usually store data in internal storage and install firewalls to protect against
intruders to access the data. They also standardize data access procedures to prevent insiders to
disclose the information without permission. In cloud computing, the data will be stored in
storage provided by service providers. Service providers must have a viable way to protect their
clients‟ data, especially to prevent the data from disclosure by unauthorized insiders. Storing the
data in encrypted form is a common method of information privacy protection. If a cloud system
is responsible for both tasks on storage and encryption/decryption of data, the system
administrators may simultaneously obtain encrypted data and decryption keys. This allows them
to access information without authorization and thus poses a risk to information privacy. This
study proposes a business model for cloud computing based on the concept of separating the
encryption and decryption service from the storage service. Furthermore, the party responsible
for the data storage system must not store data in plaintext, and the party responsible for data
encryption and decryption must delete all data upon the computation on encryption or decryption
is complete.
A CRM (Customer Relationship Management) service is described in this paper as an example to
illustrate the proposed business model. The exemplary service utilizes three cloud systems,
including an encryption and decryption system, a storage system, and a CRM application system.
One service provider operates the encryption and decryption system while other providers
operate the storage and application systems, according to the core concept of the proposed
business model.
This paper further includes suggestions for a multi-party Service-Level Agreement (SLA)
suitable for use in the proposed business model.
AR-90 A Baseline System For Telugu – English Translation Using Moses
D. Praveena1 and Dr. A. Ram Mohan Reddy
2
1II M.Tech., 2Professor and Head, Dept. of CSE, SVUCE, Tirupati.
Abstract: This paper describes the development of a statistical machine translation system based
on the Moses decoder. Several different translation strategies were explored. We also use a
statistical language model that is based on a continuous representation of the words in the
vocabulary. A huge parallel corpus is required for performing the statistical machine translation.
The aim of this paper is to explore Statistical Machine Translation using the Moses toolkit for
creating a Telugu-English translator. To perform Telugu- English translation, a parallel corpus of
this language has been provided. Larger the size of the data provided for the training of the
Moses decoder, more accurate is the translated output.
AR-92 Classification of Agriculture Land using Spatial Data mining
techniques based on remote sensing images with GIS
M. Sirish Kumar and Dr. S. Jyothi II M.Tech., Professor, Dept. of Computer Science, SPMVV, Tirupati.
Abstract : India is a predominantly agriculture based country with more than two thirds of its
population living in rural areas where agriculture is the main occupation of people. Agricultural
operation is closely connected with natural resources that have an obvious spatial character
which is considered essential character of Geographic Information Systems (GIS).
The landuse- land cover pattern of a region is an outcome of both natural and socio-economic
factors and their utilization by man in time and space. Land is becoming a scarce commodity due
to immense agricultural and demographic pressure. Hence, information on landuse-land cover
and possibilities for their optimal use is essential for the selection, planning and implementation
of land uses schemes to meet the increasing demands for basic human needs and welfare.
Increasing human interventions and unfavorable bio-climatic environment has led to
transformation of large tracts of land into wastelands. Satellite remote sensing play an important
role in generating information about the latest landuse-land cover pattern in an area and its
temporal changes through times. The information being in digital form can be brought under
Geographical Information System (GIS) to provide a suitable platform for data analysis, update
and retrieval.
ST-01 Digital Image Processing
R. N. Vinodini and P. Hareesha B.Tech(CSE), Vaishnavi Inst. of Technology for Women, Tirupathi.
Abstract: This paper mainly explains about the basic technological aspects of digital image
processing. It has a special reference to satellite image processing. Image processing deals with
the initial processing of raw image data to correct for geometric distortion, to calibrate the data
radio metrically and to eliminate noise present in the data. The objective of the information
extraction operations is to replace visual analysis of the image data with quantitative techniques
for automating the identification of features in a scene. It involves the analysis of multispectral
image data and the application of statistically based decision rules for determining the land cover
identity of each pixel in an image. Then it is to categorize all pixels in a digital image into one of
several land cover classes or themes. This classified data may be used to produce thematic maps
of the land cover present in an image.
ST-02 Pill Camera
D. Anusha MCA V Semr, Sri Padmavati Mahila Visvavidyalayam, Tirupati. [email protected]
Abstract: The aim of this technology is to make products in a large scale for cheaper price and
increased quality the current technologies have attained a part of it, but the manufacturing
technology is at macro level. The future lies in manufacturing product right from the molecular
level. Research in this direction started way back in eighties. At that time manufacturing at
molecular and atomic level was laughed about. But due to advent of nanotechnology we have
realised it to a certain level. One such product manufactured is PILL CAMERA, which is used
for the treatment of cancer, ulcer and anaemia. It has made revolution in the field of medicine.
This tiny capsule can pass through our body, without causing any harm. It take the
pictures of our intestine and transmits the same to the receiver of the computer analysis of our
digestive system. This process can help in tracking any king of disease related to digestive
system. Also we have discuss the drawbacks of PILL CAMERA and how these drawbacks can
be over come using Grain sized motor and bi-directional wireless telemetry capsule. Besides this
we have reviewed the process of manufacturing products using nanotechnology. Some other
important applications are also discussed along with their potential impact on various fields.
Types of Pill Cameras, Advantages and Disadvantages are discussed in this paper.
ST-03 Study on methodology of Ethical Hacking
G. Archana III sem MCA, SVEC, A.Rangampet, Tirupati. [email protected]
Abstract: In this paper we have reviewed on fast growing areas in network security, and certainly
an area that generates much discussion is that of ethical hacking. In today's context where the
communication techniques have brought the world together; have also brought into being anxiety
for the system owners all over the globe. Today more and more software are being developed
and people are getting more and more options in their present software„s. But many are not
aware that they are being hacked without their knowledge. One reaction to this state of affairs is
a behavior termed ―Ethical Hacking" which attempts to proactively increase security protection
by identifying and patching known security vulnerabilities on systems owned by other parties. A
good ethical hacker should know the methodology chosen by the hacker like reconnaissance,
host or target scanning, gaining access, maintaining access and clearing tracks. For ethical
hacking we should know about the various tools and methods that can be used by a black hat
hacker apart from the methodology used by him. Also when thinking from the point of view of
the developer, he also should be aware of these since he should be able to close holes in his
software even with the usage of the various tools. With the advent of new tools the hackers may
make new tactics. But at least the software will be resistant to some of the tools.
ST-04 Surface Technology
O. Pushpalatha and d. Ramyakrishna V sem mca, spmvv, tirupati. [email protected]
Abstract: Surface computing breaks down traditional barriers between people and
technology, changing the way people interact with all kinds of everyday content, from
photos to maps to menus. The intuitive user interface works without a traditional mouse or
keyboard, allowing people to interact with content and information by using the ir hands and
natural movements it is a natural user interface that allows people to interact with digital
content the same way they have interacted with everyday items such as photos, paintbrushes
and music their entire life, with their hands, with gestures and by putting real-world objects
on the surface. It is used for teaching purpose, it is used in banks, restaurants, organizations
etc. It is wireless. It isn't simply a touch screen, but more of a touch-grab-move-slide-resize-
and-place-objects-on-top-of-screen and this opens up new possibilities that weren't there
before.
ST05 Expert System
S. Latha and Ch. Geetha V Sem MCA, SPMVV, Tirupati. [email protected], [email protected]
Abstract: This paper explores an approach to building an adaptive expert system in an
environment of human-computer collaboration. Components of an adaptive system are
identified, with an emphasis on the mechanisms that enable adaptive behavior to occur.
Knowledge representation in a rule-based, object-orientated expert system is described through
the establishment of appropriate relationships utilizing heuristic rules, objects, and agents. The
experimental expert system displays low level learning capabilities that show sufficient promise
to warrant further research.
ST-06 Green Computing
D. Anitha Sahithi & K. Jyothi V Sem MCA, SPMVV, Tirupati. [email protected]
Abstract: Green computing is the environmentally responsible use of computers and related
resources. Such practices include the implementation of energy-efficient central processing units
(CPUs), servers and peripherals as well as reduced resource consumption and proper disposal of
electronic waste (e-waste). Green Computing is now under the attention of not only
environmental organizations, but also businesses from other industries. In recent years,
companies in the computer industry have come to realize that going green is in their best interest,
both in terms of public relations and reduced costs. This paper will take a look at several green
initiatives currently under way in the computer industry. Green computing is the utmost
requirement to protect environment and save energy along with operational expenses in today's
increasingly competitive world. The importance of green computing is discussed in this paper.
ST07 Efficiency of Sliding window protocol using POOSL
K. Padma and G. Hareesha
III MCA, Sree Vidyanikethan College, A.Rangampet, Tirupati.
[email protected], [email protected]
Abstract: In this paper we have analyzed a “sliding window protocol” is a feature of packet-
based data transmission protocols. Sliding window protocols are used where reliable in-order
delivery of packets is required, such as in the data link layer (OSI Model) as well as in the
Transmission Control Protocol (TCP). The sliding window algorithm is widely used in many
standard network protocols. It can ensure a correct data transfer over unreliable channels where
packets may be duplicated, lost, or reordered. An abstract executable performance model of the
protocol is created in POOSL. Several simulation results can be derived from this model in
various network environments and different parameter settings. When we design adaptive
algorithms or novel protocols with the sliding window algorithm, these results are very helpful to
identify optimal parameter settings and to determine a number of key-parameters such as the
window size, the timeout period and the packet size before the implementation of the protocols.
We improve the correctness of a sliding window protocol with an arbitrary finite window size n
and sequence numbers modulo 2n.
ST-08 A Review on Interaction Design for Touch screen Applications
M. Thipna and K. Thulasi III Sem MCA, SVEC, A.Rangampet, Tirupati. [email protected], [email protected]
Abstract: In this paper we studied various rules for designing the user interface, specifically for
touch screens applied devices. It requires a screen and interaction design, which differs
considerably from normal user interface design. It compares finger-operated with stylus-operated
touch screens, comparison like Interaction, Operation, Speed, etc. This paper covers the
technologies like Resistive, Surface capacity, Surface Acoustic Wave (SAW). In this paper we
are going to review the Golden rules like Speed, Testing, Characteristics like Direct control,
Speed control, Accuracy, Footprint. How to maintain the Screen Space, Buttons used and also
we are going to discuss about the selection menus. In this paper, we re-examine the use of Touch
Screen Technology, the limitations. Today, a large share of population is personal computer, yet
the touch screens have been adopted by computer users of all abilities because it is simple, fast
and innovative. In future there would be no use of mouse and keyboard as they would be
replaced by touch screen.
ST-09 A Survey on 4G Communications M. Kalavathi and M. Kavya
III Sem MCA, SVEC, A.Rangampet, Tirupati.
[email protected], [email protected]
Abstract: In this paper we have studied mobile communication is continuously one of the hottest
areas that are developing at a booming speed, with advanced techniques emerging in all the
fields of mobile and wireless communications. Current times are just the beginning for deploying
3G mobile communication systems, while research on the next generation of mobile
communications, 4G wireless and mobile networks begin to pave the way for the future. This
paper re-examine various visions of 4G from a technical perspective. After a brief review on the
development history and status of mobile communications and related 4G perspectives, we
present an overall 4G feature framework based on the kernel concept of integration, in which two
key features (diversity and adaptability) of the three targets (terminals, networks, and
applications) are described in detail. The concepts of both external and internal diversity of each
target are defined to illustrate the causes and solutions of the adaptability feature. Then, along the
entire 4G domain, each feature in the framework is deeply discussed from a technical standpoint,
in which promising techniques and possible research issues for sufficient support of adaptability
are also proposed. Finally, a short summary on 4G visions is presented as a continuum of
features in the development of the mobile communications world.
ST-10 Data Warehousing & Data Mining M. Lokesh Reddy and G. Venkatesh Babu
Dept. of MCA, SVEC, A.Rangampet, Tirupati. [email protected], [email protected]
Abstract: -In this paper an Introduction to Data Mining is presented, as it is the extraction of
hidden predictive information from large databases is a powerful new technology with great
potential to help companies focus on the most important information in their data warehouses
and to best apply these advanced techniques, they must be fully integrated with a data warehouse
as well as flexible interactive business analysis tools which is possible by Architecture of Data
Mining. An overview of different stages/processes are identified such as Selection,
Preprocessing, Transformation and Data Mining. Data Mining applications like
Retail/Marketing, Banking, Insurance & Health care and Medicine are presented and a glance of
Need of Data Warehouse and functionalities of Data Mining. We represent different modules in
Data information, i.e. to preserve the security and integrity of mission-critical OLTP
applications, while giving you access to the broadest possible data of database. This results to
consume hundreds of gigabytes - or even terabytes - of disk space which requires an effective
solution for the above stated problem and coming to Criteria for Data Warehouse we have few
phases, they are Load Performance, Load Processing, Data Quality Management and Query
Performance. The conclusion is that, business needs to built through deep and far-reaching
strategic thinking. The strategic ideas that support data warehousing as a strategic initiative are
learning and foreknowledge. Data warehousing meets the fundamental business needs.
ST-11 Cloud Computing - New Cutting Edge to Business
T. Madhavi & Y. Anusha Dept. of MCA, SVEC, A.Rangampet, Tirupati.
[email protected], [email protected]
Abstract: This paper gives a glimpse of understanding on cloud computing as a technology for a
new era. Its potential is considered so vast that it is surely going to give up a new dimension for
the generation to come. Cloud computing technology has been a new buzzword in the IT
industry and expecting new horizon for coming world. It is a style of computing which is having
dynamically scalable virtualized resources provided as a service over the Internet. It reduces the
time required to procure heavy resources and boot new server instances in minutes, allowing one
to quickly scale capacity, both up and down, as ones requirement changes. This technology is
ready to cater to the small and medium business segment. The enterprises are exploring the
possibilities of adopting this technology, it is imperative for these enterprises to critically
evaluate the feasibility of this technology for their specific businesses.
Computing consumers consume resources as a service and pay only for resources that they use.
Many cloud-computing offerings employ the utility computing model, which is analogous to
how traditional utility services (such as electricity) are consumed, while others bill on a
subscription basis. Sharing "perishable and intangible" computing power among multiple tenants
can improve utilization rates, as servers are not unnecessarily left idle (which can reduce costs
significantly while increasing the speed of application development).This paper provides brief
details about the cloud computing with an overview of key features about the new focused
technology.
ST-12 Natural Computing Interface Through Artificial Cloud Computing
D. J. Samatha Naidu1, Dr. P. Chitti Babu
2, G. Suresh
3 and S.Shabir
4
1Assistant professor, MCA Department, APGCCS, Rajampet. [email protected] 2Professor&Principal, APGCCS, Rajampet. [email protected]
3,4MCA final year students, APCCS, Rajampe. [email protected]
Abstract: Cloud computing is a deployment model leveraged by IT in order to reduce
infrastructure costs and/or address capacity/scalability concerns. Cloud computing is not about
the application itself; it is about how the application is deployed as how it is delivered. End-users
use applications, and an application is not cloud computing. It is the infrastructure and model of
deployment that defines whether it is cloud computing, and even then, it's never cloud computing
to the end-user, only the folks involved in developing and deploying that application. Cloud ware
is an extension of cloud computing but they do not enable businesses to leverage cloud
computing. Cloud computing is rapidly increasing in popularity. Companies such as RedHat,
Microsoft, Amazon, Google, and IBM are increasingly funding cloud computing infrastructure
and research, making it important for students to gain the necessary skills to work with cloud-
based resources. Cloud Computing refers to both the applications delivered as services over the
Internet and the hardware and systems software in the datacenters that provide those services.
The services themselves have long been referred to as Software as a Service (SaaS). The
datacenter hardware and software is what we will call a Cloud. When a Cloud is made available
in a pay-as-you-go manner to the general public, we call it a Public Cloud; the service being sold
is Utility Computing.
ST-13 A Conceptual way of Cryptography in Smart Cards for
Vehicle control System
D. J. Samatha Naidu1, Dr. P. Chitti Babu
2, S. Shabir
3 and S. RIYAZ
4
1Assistant professor, MCA Department, APGCCS, Rajampet. [email protected] 2Professor&Principal, APGCCS, Rajampet. [email protected]
3,4MCA final year students, APGCCS, Rajampet. [email protected], [email protected]
Abstract: In the age of universal electronic connectivity, of viruses and hackers of electronic
eaves dropping and electronic fraud there is indeed no time at which security does not matter.
The issue of security and privacy is not a new one however, and the age-old science of
cryptography has been in use, since people had information that they wish to hide. Cryptography
has naturally been extended into realm of computers, and provides a solution electronic security
and privacy issue. As the technology increases, Smart Cards (e.g.: SIM cards, Bank cards, Health
cards) play very important role in processing many transactions with high level of security. This
security level achieved by means of Cryptography. In this paper i am presenting an introduction
to cryptography, basics of Smart Cards, the role of cryptography in Smart Cards, and the
processing of an example transaction involving security (Bank Card).
ST-14 Data Mining and Warehousing
Kammara Mohanachari
I Sem M.Sc. Computer Science, Vikrama Simhapuri University, Nellore.
[email protected], 9441715051.
Abstract: Many software projects are accumulated by a great deal of data, so we really need
information about the effective maintenance and retrieving of data from the database. The
newest, hottest technology to address these concerns is data mining and data warehousing. Data
Mining is the process of automated extraction of predictive information from large databases. It
predicts future trends and finds behavior that the experts may miss as it lies beyond their
expectations. Data Mining is part of a larger process called knowledge discovery, specifically,
the step in which advanced statistical analysis and modeling techniques are applied to the data to
find useful patterns and relationships. Data warehousing takes a relatively simple idea and
incorporates it into the technological underpinnings of a company. The idea is that a unified view
of all data that a company collects will help improve operations. If hiring data can be combined
with sales data, the idea is that it might be possible to discover and exploit patterns in the
combined entity. This paper will present an overview of the different process and advanced
techniques involving in data mining and data warehousing.
ST-15 Bloom Box Energy Y. Prasanthi and K. Ravali
B.Tech. ECE IV, [email protected], [email protected]
Abstract: World has been constantly struggling with the energy problems. Scientists are
searching for new economic, clean, renewable and efficient sources of energy. We are unable to
find any reliable energy resource which will satisfy all our needs. Now the world has been
introduced to Bloom Energy, a new entry in the fuel cell business which claims to be ready to
revolutionize the energy economy. Bloom Box has been embraced by big names such as eBay,
Google, Staples. The human demand for energy is enormous and exponentially increasing.
Today, the energy sector is one of the most potential and profitable sector. As 80 to 90 percent of
the world‟s total energy comes from combustion of fossil fuels which are limited and create
pollution, the need to find other renewable, non-exhausting and clean energy resources is
increasing. The traditional approach to energy production has many challenges such as emission
of green gases. Mr. K. R. Sridhar, an Indian-American rocket scientist and co-founder and CEO
of Bloom Energy has now come up with a Bloom Box which is suppose to meet all these
challenges. Bloom Energy Server (generally called as Bloom Box) is a small size cubical
fuel cell box which can provide sufficient energy to 100 average U.S. homes or 30,000 sq. feet
office building. Bloom Energy Server with the size of refrigerator is able to produce 100 kW of
energy using hydrocarbons such as gasoline, diesel, methane or biogas to produce electricity.
Company claims that the Bloom energy Server is build on a patented solid oxide fuel cell
technology and is a new class of distributed power generator.
ST-16 Current Techniques for Fingerprint Recognition Padmaja and Siva Sankar Raju
I Sem M.Sc.Computer Science, Vikrama Simhapuri University, Kavali. [email protected]
Abstract: My Honors project is to investigate the current techniques for fingerprint recognition.
This target can be mainly decomposed into image processing, feature extraction and feature
match. For each sub-task, some classical and some up-to-date methods in literatures are
analyzed. Based on the analysis an integrated solution for fingerprint recognition is developed
for demonstration. Fingerprint image analysis for automatic identification technology has been
developed for use in a number of major applications. Important industries affected by this
technology include network security and protection, smart money, ATM systems for many
major government sectors. In this paper we discuss the major components of the technology
including the fingerprint system.
ST-17 A DSP based On-Line UPS G. Siva Ramaiah and K. Nagaraju
IV ECE, BITS, Adoni, Kurnool(Dt). [email protected],919963835240
Abstract: Many facilities such as patient health care centers, data processing systems, critical
telecommunication links, LAN servers, offices etc rely on uninterruptible power supplies (UPS)
to maintain a continuous supply of power in case of line outage. In addition to requiring
continuous power, many critical nonlinear loads are sensitive to the incoming line transients and
input harmonic voltage distortion. Conventional UPS systems operate to protect against such
disturbances using complex filtering schemes, often employing large passive components.
Among the various UPS systems online UPS provides maximum protection to such loads against
any power problems. Because of multiple power conversion stages, online UPSs have been the
most complex and expensive type of systems. Today‟s low cost, high performance Digital Signal
Processors(DSPs) provide an improved and cost- effective solution for online UPS design,
making them software controllable, adding some facilities like remote configuration and
monitoring and other network management facilities. This paper presents the basic design and
merits of using real time digital signal processing (DSP) control of UPS systems.
ST-18 Eyegaze Communication System
S. Muni lakshmi1 and B. Uma Maheswari
2
1Lecturer, 2V Sem MCA, Dept. of Computer Science, SPMVV, Tirupati.
Abstract: The field of human computer interaction has been undergoing a new renaissance lately.
While many companies have, and continue to spend millions to develop highly visually
appealing GUIs and state-of-art interaction systems for the common users since the inception of
desktops, the development of interactive systems for the disabled has taken a kick start relatively
recently. And the Eyegaze systems are one of the most pivotal inventions in this context. The
Eyegaze System is a communication and control system for people with complex physical
disabilities. You run the system with your eyes. By looking at control keys displayed on a screen,
a person can synthesize speech, control his environment (lights, appliances, etc.), type, operate a
telephone, run computer software, operate a computer mouse, and access the Internet and e-mail.
Eyegaze Systems are being used to write books, attend school and enhance the quality of life of
people with disabilities all over the world.
ST-19 A Survey on Artificial Intelligence
Neethravathi A. and M. Jagadeesh Chowdary III Sem MCA, SVEC, A. Rangampet, Tirupati.
[email protected], [email protected]
Abstract: Artificial intelligence is a branch of computer science concerned with creation of
computer systems that exhibits some form of intelligence. Artificial intelligence is concerned
with two basic ideas 1) Thought processes of humans 2) Representing those processes via
machines symbolic processing, heuristics and pattern matching are the key elements of artificial
intelligence. The pivotal software tool for Artificial intelligence is lisp (List processing
programming language). The hard ware tool is "lisp machine". Newell and Simon proposed a
model of human problem solving that makes use of the analogy between computer processing
and human information. Artificial intelligence is widely used in various fields. Perception and
knowledge representation in computer become theme of many Artificial intelligence researches.
Expert systems are computerized programs that imitate humans. Natural language
processing is a field in Artificial intelligence that processes natural language. Another important
application of Artificial intelligence is the field of robotics. Robot is mechanical Artificial
intelligence. The application of Artificial intelligence relates to almost many fields. Artificial
intelligence has civilian uses, professional uses, and applications in music, military and gaming.
Artificial intelligence theories imply much futuristic applications which are expected to progress
as fast as computer technology.
ST-20 Palm Vein Technologies Rupa Devi A. and N. Udaya Lakshmi
MCA V Sem, SPMVV, Tirupati. [email protected]
Abstract: Palm vein technologies are one of the upcoming technologies which is highly secure. It
is the world‟s first contactless personal identification system that uses the vein patterns in human
palms to confirm a person‟s identity. It is highly secure because it uses information contained
within the body and is also highly accurate because the pattern of veins in the palm is complex
and unique to each individual. Moreover, its contact less feature gives it a hygienic advantage
over other biometric authentication technologies.
The palm secure works by capturing a person‟s vein pattern image while radiating it with near-
infrared rays. The Palm Secure detects the structure of the pattern of veins on the palm of the
human hand with the utmost precision. The sensor emits a near-infrared beam towards the palm
of the hand and the blood flowing through these back to the heart with reduced oxygen absorbs
this radiation, causing the veins to appear as a black pattern. This pattern is recorded by the
sensor and is stored in encrypted form in database, on a token or on a smart card.
Veins are internal in the body and have wealth of differentiating features, assuming false identity
through forgery is extremely difficult, thereby enabling an extremely high level of security. The
Palm Secure technology is designed in such a way that it can only detect the vein pattern of
living people. The scanning process is extremely fast and does not involve any contact meaning
that Palm Secure meets the stringent hygienic requirements that are normally necessary for use in
public environments.
ST-21 A Survey on Cloud Computing and Applications
G. Prasanthi and J. Rekha III Sem MCA, SVEC, A.Rangampet, Tirupati. [email protected], [email protected]
Abstract: This paper presents details regarding cloud computing, its architecture, benefits,
services, types of clouds. This paper also presents a brief view about cloud storage and also its
present part of economy for most popular businesses. The Cloud computing technology has
been widely applied in e-business, e-education. Cloud computing platform is a set of Scalable
large-scale data server clusters, it provides computing and storage services to customers Thus
cloud computing provide a super-computing power. This cloud of computers extends beyond a
single company or enterprise. The applications and data served by the cloud are available to
broad group of users, cross-enterprise and cross-platform.
ST-22 5G Mobile Technology S. Muni lakshmi
1 and N.Bharati
2
1Lecturer,
2V Sem
MCA, Dept. of Computer Science, SPMVV, Tirupati.
Abstract: 5G technologies will change the way most high-bandwidth users access their phones.
With 5G pushed over a VOIP-enabled device, people will experience a level of call volume and
data transmission never experienced before. 5G technology is offering the services in Product
Engineering, Documentation, supporting electronic transactions (e-Payments, e-transactions)
etc. As the customer becomes more and more aware of the mobile phone technology, he or she
will look for a decent package all together, including all the advanced features a cellular phone
can have. Hence the search for new technology is always the main motive of the leading cell
phone giants to out innovate their competitors. Recently apple has produced shivers all around
the electronic world by launching its new handset, the I-phone. Features that are getting
embedded in such a small piece of electronics are huge. The 5g design is based on user-centric
mobile environment with many wireless and mobile technologies on the ground. The selection
of the RAT is performed by the mobile terminal by using the proposed user agent for multi-
criteria decision making based on the experience from the performance measurements performed
by the mobile terminal.
ST-23 A Survey of Routing Protocols in Mobile Ad Hoc Networks and
Wireless Sensors
C. R. Surendra Reddy and K. Ravi Babu III Sem MCA, SVEC, A.Rangampet, Tirupati. [email protected], [email protected]
Abstract: In this paper, we have studied Mobile Ad Hoc Network (MANET) which is a
collection of Mobile Ad hoc network (MANET) is a collection of Multi-hop wireless mobile
nodes that communicate with each other without centralized control or established infrastructure.
The wireless links in this network are highly error prone and can go down frequently due to
mobility of nodes, inference and less infrastructure. Therefore, routing in MANET is a critical
task due to highly dynamic environment. In recent years several routing protocols have been
established for mobile ad-hoc networks and prominent among them are DSR, TORA. An ad-hoc
network is a temporary infrastructure less network. formed dynamically by mobile devices
without turning to any exciting centralized administration .To send packets to remote nodes uses
other intermediate nodes as relays and ask them to forward its packets .For this purpose ,a
distributed routing protocol is required. Because the devices used are mobile, the network
topology is unpredictable, and it may change at any time. In this paper, we drive a GloMosim
based simulation study, to investigation the mobility effects on the performance of several
mobile ad-hoc routing protocols, and also paper provides an overview of these protocols by
presenting their characteristics, and functionality, benefits and limitations and then makes their
comparative analysis so to analyze their performance. In this paper it has been observed in detail
about how the performance of these Protocols can be improved.
ST-24 Introduction to Network Security
M. Kullai Reddy I Sem M.Sc.Computer Science, Vikrama Simhapuri University, Kavali.
Abstract: Network security is a complicated subject, historically only talked by well-trained and
experienced experts. However as more and more people become “wired”, an increasing number
of people need to understand the basics of security in a networked world. This document was
written the basic computer user and information system manager in mind, explaining the
concepts needed to read trough the hype in the market place and understand risks and hoe to deal
with them. Some history of networking is included, as well as introduction to TCP/IP and
internet working. We go on to consider risk management, network threats, firewall, and more
special-purpose secure networking devices. This is not intended to be a “frequently asked
questions” reference, nor is it a “hands-on” document describing how to accomplish specific
functionality. It is hoped that the reader will have a wider perspective on security in general, and
better understand how to reduce and manage risk personally, at home, and in the work place.
ST-25 Application of Visualization Technology in Spatial Data mining
K. Bhargavi and K. P. JayaPrakash
II Sem MCA, SVEC, A.Rangampet, Tirupati.
[email protected], [email protected]
Abstract: Spatial data mining and spatial data visualization are two comparatively popular
technical methods in recent years, in essence, both purpose is to find geography
phenomena what spatial data express and find various knowledge and laws implicit
in geography entity. so it is necessary to combine both organically and form a new
research direction - Visualization Spatial Data Mining (VSDM). This paper mainly
discusses the key relationships of visualization and spatial data mining, the main
Application of visualization theories and technologies in spatial data mining, the main
methods and examples of visualization spatial data mining, we also present a reference model
Visualization Spatial Data.
ST-26 A Survey on Apriori Algorithm on Association Rules
N. Chandana and R. Dharani III Sem MCA, SVEC, A. Rangampet, Tirupati. [email protected], [email protected]
Abstract: Apriori algorithm is the most classical algorithm in association rule mining, but it has
two fatal deficiencies: more scans for the databases and generates a great deal of candidate
itemsets. To solve these two deficiencies of Apriori algorithm, an efficient and fast algorithm
based on Pattern Matrix is proposed, which solves these two problems: scanning for the
databases is cut down to one time and not generating the candidate itemsets but generating the
frequent itemsets directly. It greatly reduces the temporal complexity and spatial complexity of
the algorithm and highly promotes the efficiency of Aprior algorithm. Because of the rapid
growth in worldwide information, efficiency of association rules mining has been concerned for
several years.
ST-27 3G vs WiFi
Lingamurthy A. and K. Darshan III Sem MCA, SVEC, A.Rangampet, Tirupati. [email protected], [email protected]
Abstract: In this paper we are going to compare and contrast two technologies for delivering
broadband wireless Internet access services: “3G vs WiFi”. The former 3G, refers to the
collection of third generation mobile technologies that are designed to allow mobile operators to
offer integrated data and voice services over mobile networks, and also we are going to the
802.11b wireless Ethernet standard that was designed to support wireless LANs. Although the
two technologies reflect fundamentally different services, industry and architectural design goals,
origins and philosophies. Each has recently attracted a lot of attention as candidates for the
dominant platform for providing broadband wireless access to the Internet. It remains an open
question as to the extent to which these two technologies are in competition or, perhaps, may be
complementary. If they are viewed as in competition, then the triumph of one at the expense of
the other would be likely to have profound implications for the evolution of the wireless internet
and structure of the service provider industry. In this paper we conclude that the article offers a
qualitative comparison of two wireless technologies.
ST-28 Bandwidth Estimation in Broadband Access Networks
L. R. Manohar Reddy III Sem MCA, SVEC, A.Rangampet, Tirupati. [email protected]
Abstract: In this paper we have re-examined how much work on developing techniques for
estimating the capacity and the available bandwidth of network paths based on end-point
measurements. The focus has primarily been on settings where the constrained link can be
modeled as a point-to-point link with a well-defined bandwidth, serving packets in FIFO order.
In this paper, we point out that broadband access networks, such as cable modem and 802.11-
based wireless networks break this model in various ways. The constrained link could (a) employ
mechanisms such as token bucket rate regulation, (b) schedule packets in a non- FIFO manner,
and (c) support multiple distinct rates. We study how these characteristics impede the operation
of the various existing methods and tools for capacity and available bandwidth estimation, and
present a new available bandwidth estimation technique, Probe-Gap, that overcomes some of
these difficulties. Our evaluation is based on experiments with actual 802.11a and cable modem
links.
ST-29 Haptic Technology
V. Latha & M. Sowjanya III Sem MCA, SPMVV, Tirupati
[email protected], [email protected]
Abstract: Engineering as it finds its wide range of application in every field not an exception
even the medical field. One of the technologies which aid the surgeons to perform even the most
complicated surgeries successfully is Virtual Reality.
Even though virtual reality is employed to carry out operations the surgeon‟s attention is
one of the most important parameter. If he commits any mistakes it may lead to a dangerous end.
So, one may think of a technology that reduces the burdens of a surgeon by providing an
efficient interaction to the surgeon than VR. Now our dream came to reality by means of a
technology called “HAPTIC TECHNOLOGY”.
Haptic is the “science of applying tactile sensation to human interaction with
computers”. In our paper we have discussed the basic concepts behind haptic along with the
haptic devices and how these devices are interacted to produce sense of touch and force feedback
mechanisms. Also the implementation of this mechanism by means of haptic rendering and
contact detection were discussed.
We mainly focus on „Application of Haptic Technology in Surgical Simulation and
Medical Training’. Further we explained the storage and retrieval of haptic data while working
with haptic devices. Also the necessity of haptic data compression is illustrated
ST-30 5pen PC Technology
R. Hemalatha & G. Priyamvada
III Sem MCA, SPMVV, Tirupati.
[email protected], [email protected]
Abstract: P-ISM (Pen-style Personal Networking Gadget Package), which is nothing but the
new discovery, which is under developing, stage by NEC Corporation. P-ISM is a gadget
package including five functions: a pen-style cellular phone with a handwriting data input
function, virtual keyboard, a very small projector, camera scanner, and personal ID key with
cashless pass function. P-ISMs are connected with one another through short-range wireless
technology. The whole set is also connected to the Internet through the cellular phone function.
This personal gadget in a minimalist pen style enables the ultimate ubiquitous computing.