APSCHE - IJPAPERijpaper.com/wp-content/uploads/2013/03/CSEA_Souvenir.pdfSri Padmavati Mahila...

79
APSCHE Sponsored NATIONAL CONFERENCE ON COMPUTER SCIENCE, ENGINEERING AND APPLICATIONS CSEA 2012 9 th & 10 th November, 2012 Organised by DEPARTMENT OF COMPUTER SCIENCE SRI PADMAVATI MAHILA VISVAVIDYALAYAM (Women’s University) TIRUPATI 517502 ANDHRA PRADESH, INDIA www.spmvv.ac.in Dr. M. Usha Rani Convener

Transcript of APSCHE - IJPAPERijpaper.com/wp-content/uploads/2013/03/CSEA_Souvenir.pdfSri Padmavati Mahila...

APSCHE

Sponsored

NATIONAL CONFERENCE ON

COMPUTER SCIENCE, ENGINEERING AND

APPLICATIONS

CSEA – 2012

9th & 10th November, 2012

Organised by

DEPARTMENT OF COMPUTER SCIENCE

SRI PADMAVATI MAHILA VISVAVIDYALAYAM

(Women’s University)

TIRUPATI – 517502

ANDHRA PRADESH, INDIA

www.spmvv.ac.in

Dr. M. Usha Rani Convener

Chief Patron – Prof. S. Rathna Kumari

Vice Chancellor

Patron –Prof. E. Manjuvani

Registrar

Organizing Committee

Prof. K. Sandhya Rani M.Sc., PGDCA, M.Tech., Ph.D.

Prof. S. Jyothi M.Sc, M.S., Ph.D.

Dr. M. Usha Rani M.C.A., Ph.D.

Dr. K. Usha Rani M.Sc., B.Ed., M.C.A., Ph.D.

Technical Committee

M. Sirish Kumar M.C.A.

P. Gowthami M.C.A.

S. Munilakshmi M.C.A.

E. Durga Priya Darshini M.C.A.

T. D. Gopi M.C.A.

B. Lavanya M.C.A.

T. Kavya B.Sc., D.C.A.

PREFACE

National Conference on Computer Science, Engineering and Applications is the right venue to

mix the science along with the industrial needs. Computer Science and Engineering is an

emerging and promising discipline in shaping the future research and development activities in

both academic and industry in the fields ranging from engineering, science, finance and

humanities. Conference on Computer Science, Engineering and Applications looks for

significant contributions from researchers for sharing knowledge and results in theory,

methodology and applications of Computer Science. This conference will be an excellent

national forum which will provide great opportunity for the teachers, scientists, engineers,

researchers, scholars and students to exchange new ideas in all aspects of the research fields.

This national conference consists of 8 Technical sessions included with 8 plenary

speeches. About 125 papers were received from all over India, 90 were selected for presentation

and 56 were accepted for inclusion in the proceedings after a rigorous peer review by organizing

committee. We congratulate all authors of those manuscripts that have been accepted, and

request authors of manuscripts that could not be included in the proceedings to bear with our

difficulty in not being to accept them.

The presentations were organized under 18 specializations which are as follows:

Algorithms and Bioinformatics

Computer Architecture & Real time Systems

Computer Graphics & Vision

Cryptography & Network Security

Database Systems & Data Mining

Dependable, Reliable and Autonomic

Computing

Digital Watermarking and Steganography

Distributed and Parallel Systems &

Algorithms

Embedded System and Software

Geographical Information Systems

Global Navigation Satellite Systems

Grid and Scalable Computing

Image Processing/Pattern

Recognition/Multimedia

Mobile and Ubiquitous Computing

Natural Language Processing &

Machine Learning

Networking and Communications

Soft Computing

Software Engineering

We would like to thank all the authors for their interest in CSEA-2012. We are grateful to

Vice-Chancellor Prof. S. Rathna Kumari for her constant encouragement and support. We also

thank Registrar Prof. E. Manjuvani, Dean of Sciences - Prof. D. Bharathi, Prof. K. Sandhya

Rani, Prof. T. Sudha, Prof. S. Jyothi and Dr. K. Usha Rani for their support in organizing the

conference. We sincerely acknowledge the financial assistance from APSCHE. Also,

acknowledge must be made of the support provided by faculty, research scholars and students,

too numerous to mention individually, who worked so diligently on various aspects of the

conference. We thank all the teaching and non-teaching staff members, research scholars and

students of the Department of Computer Science, Sri Padmavati Mahila Visvavidyalayam,

Tirupati who have helped us in organizing this conference and in compilation and editing of the

proceedings.

Convener

Dr. M. Usha Rani

PROFILE OF THE UNIVERSITY

Sri Padmavati Mahila Visvavidyalayam (University for Women) is the only institution of

higher learning in Andhra Pradesh devoted exclusively to women‟s education. The University

was started in year 1983 with the avowed objective of giving professional education to women in

AP and making them self reliant. Further the University was established with conviction that

emancipation and empowerment of women can be achieved only through education. The mission

of the university as depicted in its emblem is Emancipation of Women through Acquisition of

Knowledge. To this end the University offers courses which serve the dual purpose of academic

excellence with applied orientation.

The goals of the University are

To be a change agent in transforming the status of women from a minority to majority by

its role and power sharing.

To expand the horizons of knowledge by education, research and consultancy.

To propagate knowledge through conferences and publications.

To improve the quality of life of people and organizations in the society through

extension work and consultancy.

To strengthen and promote organizations that serve the interest of women through

networking and collaborations.

The campus of SPMVV is spread over in lush green area of 138.43 acres. The campus

has serene atmosphere and provides the right ambience for student learning. The University is

situated at a distance of 3 km from the railway and bus stations of Tirupati.

The University campus encompasses the Humanities, Science and Engineering Schools

Headed by a Dean, hostels for students, Staff Quarters, Computer Centre, Sericulture Farm,

Indoor Stadium, Library Buildings and Health Centre. In tune with the objectives, the University

is offering many courses that are job-oriented, professional and applied in nature. However,

keeping in view the need to have some basic courses that could be complementary to the applied

courses, the University is now launching new courses of basic nature.

The courses are so designed as to bring about application potential among students. The

instruction covers classroom teaching, laboratory and fieldwork. The learning environment

involves both live and simulated experiences. This University is distinct from the other

traditional Universities, in that it lays great emphasis on the value of extension as the third

dimension on par with the other two dimensions viz., teaching and research. Community service

is integrated into the curriculum by giving 20% weight age in the final grading for the degrees

(for instances, legal aid, nutrition education to the community, development of women and

children in rural areas, etc.). All the professional courses are monitored by national level bodies

such as National Council for Teacher Education (NCTE), All India Council for Technical

Education (AICTE), Bar Council of India and Pharmacy Council of India etc.

DEPARTMENT OF COMPUTER SCINCE: A PROFILE

The field of Computer Science has excellent employment potential in the present

explosion of technological development. The Department of Computer Science was established

in the year 1983 and offering 3 years Master of Computer Applications course since 1987. At

present department offers MCA programme following Choice Based Credit System in semester

pattern and research programmes: M.Phil. and Ph.D. The department has highly qualified and

eminent senior faculty members. The department of Computer Science is having e-class room

and computer lab with more than 80 high configured computers & latest software connected with

LAN facility.

Training at postgraduate level in Computer Science offers immense scope for

opportunities in software development and information technology. Employment opportunities

through campus interviews are provided to the students. The department is providing text books,

MCA, M.Phil., Ph.D. dissertations through departmental library. IEEE journals can be accessed

through digital library facility in the department. Active research is being done in the department

through M.Phil. and Ph.D. programmes. Number of scholars enrolled at present in the

department is 44. Number of Ph.D.s awarded during last 5 years is 20. The department has

conducted four National conferences, one international conference and the faculty have attended

many workshops and presented more than 250 papers at National and International conferences

and published number of articles in reputed journals. The department actively involved in

research in the areas like Artificial Intelligence, Data Mining, Neural Networks, Fuzzy Systems,

Genetic Algorithms, Computer Networks, Network Security, Parallel Processing, Image

Processing, Pattern Recognition, Bio-Computing, Bio Informatics and GIS.

Prof. S. Rathna Kumari Vice Chancellor Sri Padmavati Mahila Visvavidyalayam (Women’s University) Tirupati.

MESSAGE

I am happy to know that Department of Computer Science is organizing a National Conference on

Computer Science, Engineering and Application (CSEA-2012) on November 9th & 10th, 2012, in Sri

Padmavati Mahila Visvavidyalayam, Tirupati funded by APSCHE.

I am confident that, this conference will be an excellent national forum which will

provide great opportunity for the teachers, scientists, engineers, researchers, scholars and

students to exchange new ideas in all aspects of the advanced computer science fields like Soft

computing, Data mining, Pattern recognition, Bio-informatics, Grid & Cloud computing,

Steganography etc.

I am confident that the deliberations of the conference would be beneficial to the

researchers and academic in different parts of the nation who are attending this event.

I congratulate the department for organizing this National Conference and I wish all

success.

Prof. S. Ratna Kumari

Prof. E. Manjuvani, M.Sc., M.Phil., Ph.D. Registrar Sri Padmavati Mahila Visvavidyalayam (Women’s University) Tirupati.

MESSAGE

It is pleasure to know that the Department of Computer Science, Sri Padmavati Mahila

Visvavidyalayam, is organizing National Conference on Computer Science, Engineering and

Application (CSEA-2012) on November 9th

& 10th, 2012, in Sri Padmavati Mahila

Visvavidyalayam, Tirupati funded by APSCHE.

In this era of globalization and high competitions, Computers and its applications have

emerged in the forefront of every field of life. The national conference would serve as a forum to

know the challenges associated in this frontier and provide the directive for future research. In

the present scenario the theme of the conference is relevant to meet the present day needs and I

wish the delegates all the success. I congratulate the staff, research scholars and students of the

computer science department in organizing the conference.

Prof. E. Manjuvani

Prof. D. Bharathi

Dean, School of Sciences

Sri Padmavati Mahila Visvavidyalayam

(Women‟s University)

Tirupati – 517502.

MESSAGE

I am very glad to know that the Department of Computer Science is organizing a

National Conference on Computer Science, Engineering and Application (CSEA-2012) on

November 9th

& 10th, 2012, in Sri Padmavati Mahila Visvavidyalayam, Tirupati.

This conference provides an opportunity for the researchers and budding IT professionals

to know the innovative, intelligent and challenging aspects in IT. The conference gives a

comprehensive knowledge to the participants in the emerging field of Computer science and its

applications. The exchange of ideas with the resource persons will be a wonderful experience to

the participants of CSEA.

The topics selected for deliberations are very apt. I congratulate Dr. M. Usha Rani,

Convener for organizing this CSEA-2012.

Prof. D. Bharathi

MESSAGE

Information and Communication Technology (ICT) has emerged as a leading

accelerator of growth and economic prosperity across the globe. Especially, it has resulted in an

economic boom, and creation of jobs in India. Though it is a welcome trend, it is observed that

most of the IT jobs coming in our way are routine jobs with relatively low remuneration

packages. We need to acquire better skills to tackle challenging problems in ICT.

I hope that the conference of this magnitude provides an excellent opportunity to the

academic fraternity to quickly capture the exploding Technological advances and trends. I wish

the conference a great success.

Prof. C. Easwar Reddy

Director

School of Engineering and Technology

SPMVV(Women’s University)

Tirupati – 517 502.

Prof. K. Sandhya Rani , M.Sc.,M.Tech., Ph.D Department of Computer science Sri Padmavati Mahila Visvavidyalayam (Women’s University) Tirupati.

MESSAGE

The Department of Computer Science is organizing a National Conference on “Computer

Science, Engineering and Applications” (CSEA – 2012) on 9th

and 10th

November, 2012 at Sri

Padmavathi Mahila Visvavidyalayam, Tirupati. The conference covers various topics related to

Computer Science, Engineering and Applications. The conference gives an opportunity to

academicians, researchers and students to explore knowledge in latest research works and

motivates them towards active research. I congratulate the participants for the interest they have

shown towards the conference.

I congratulate the Convener Dr. M. Usha Rani for her efforts in organizing the

conference. I wish the conference a grand success.

Prof. T. Sudha, M.Sc., M.Phil., MS, Ph.D. Head & BOS Chair Person Department of Computer science Vikrama Simhapuri University, Nellore.

MESSAGE

The Department of Computer Science is organizing a National Conference

on “Computer Science, Engineering and Applications” (CSEA – 2012) on 9th

and

10th

November, 2012 at Sri Padmavathi Mahila Visvavidyalayam, Tirupati. In this

era of globalization and high competitions, computers, networking and

communications have emerged in the forefront of every field of life. Innovations in

these area are rapid and are providing crucial edge for development of any

nation.The theme in the conference is thus highly appropriate and significant for

current needs.

I congratulate the Convener Dr. M. Usha Rani for her efforts in organizing

the conference. I wish the conference a grand success.

T. Sudha

Prof. S. Jyothi M.Sc., M.S., Ph.D.

BOS Chairperson &

Head(I/C) CSE & IT

Department of Computer Science

Sri Padmavati Mahila Visvavidyalayam

Tirupati.

MESSAGE

I am happy to say that our department is organizing a Two Day National Conference on

Computer Science, Engineering and Applications (CSEA-2012). I strongly believe that this

conference will once again provide an opportunity to advance communication between

academics, researchers and industry. It is during this event that participants from around the

Nation come together, where scientists from the university, the industry, and young researchers

will have the chance to network, exchanging useful knowledge in one location.

I congratulate Dr. M. Usha Rani, Convener, CSEA-2012 for her efforts in organizing the

conference. I wish the Conference a great success.

PROGRAMME

Date 9/11/2012, Friday

Time Event Venue

8.30 AM to 10.00 AM

&

1.00 PM to 2.00 PM

Registration Saaveri Seminar Hall,

SPMVV

10.00 AM to 11.30 AM Inauguration Saaveri Seminar Hall,

SPMVV

11.30 AM to 11.45 AM Tea Break

11.45 AM to 1.30 PM

Session – ST1

Plenary Speech

&

Paper presentations

Saaveri Seminar Hall

Session – AR1 Saaveri Conference Hall

1.30 PM to 2.00 PM Lunch

2.00 PM to 5.00 PM

Session – ST2

Plenary Speech

Coffee Break

&

Paper Presentations

Saaveri Seminar Hall

Session – ST3 Saaveri Conference Hall

Session – AR2 Room #5, Dept. of Computer

Science

Session – AR3 e-Class Room, Dept. of

Computer Science

Date 10/11/2012, Saturday

9.00 AM to 10.00 AM

&

1.00 PM to 2.00 PM

Registration Dept. of Computer Science,

SPMVV

10.00 AM to 1.00 PM

Session – AR4 Plenary Speech

Coffee Break

&

Paper Presentations

Room #5, Dept. of Computer

Science

Session – AR5 e-Class Room, Dept. of

Computer Science

1.00 PM to 2.00 PM Lunch

2.00 PM to 5.00 PM

Session – AR6 Plenary Speech

Coffee Break

&

Paper Presentations

Room #5, Dept. of Computer

Science

Session – AR7 e-Class Room, Dept. of

Computer Science

SESSION-ST1 November 9, 2012 (Friday)

Saaveri Seminar Hall, SPMVV, Tirupati. Time: 11.45 AM – 1.30 PM

Plenary Speech

S.No. Paper

Code Title Authors

1 ST01 Digital Image Processing R. N. Vinodini

P. Hareesha

2 ST03 Study on methodology of Ethical

Hacking

G. Archana

3 ST06 Green Computing

D. Anitha Sahithi

K. Jyothi

4 ST07 Efficiency of Sliding window protocol

using POOSL

K. Padma

G. Hareesha

5 ST08 A Review on Interaction Design for

Touch screen Applications

M. Thipna

K. Thulasi

6 ST12 Natural Computing Interface Through

Artificial Cloud Computing

D. J. Samatha Naidu

Dr. P. Chitti Babu

G. Suresh

S. Shabir

7 ST13 A Conceptual way of cryptography in

Smart Cards for Vehicle control System

D. J. Samatha Naidu

Dr. P. Chitti Babu

S. Shabir

S. Riyaz

8 ST16 Current Techniques for Fingerprint

Recognition

Padmaja

Siva Sankar Raju

9 ST20 Palm Vein Technologies A. Rupa Devi

N. Udaya Lakshmi

10 ST27 3G vs WiFi

A. Lingamurthy

K. Darshan

SESSION-ST2 November 9, 2012 (Friday)

Saaveri Seminar Hall, SPMVV, Tirupati. Time: 2.00 PM – 5.00 PM

Plenary Speech S.No.

Paper

Code Title Authors

1 ST02 Pill Camera D. Anusha

2 ST05 Expert System

S. Latha

Ch. Geetha

3 ST09 A Survey on 4G Communications M. Kalavathi

M. Kavya

4 ST11 Cloud Computing – New Cutting Edge to

Business

T. Madhavi

Y. Anusha

5 ST14 Data Mining and Warehousing K. Mohanachari

6 ST15 Bloom Box Energy

Y Prasanthi

K. Ravali

7 ST24 Introduction to Network Security M. Kullai Reddy

8 ST25 Application of Visualization Technology

in Spatial Data mining

K. Bhargavi

K. P. Jaya Prakash

9 ST26 A Survey on Apriori Algorithm on

Association Rules

N. Chandana

R. Dharani

10 ST29 Haptic Technology V. Latha

M. Sowjanya

SESSION-ST3 November 9, 2012 (Friday)

Saaveri Conference Hall, SPMVV, Tirupati. Time: 2.00 PM – 5.00 PM

Plenary Speech S.No.

Paper

Code Title Authors

1 ST04 Surface Technology O. Pushpa Latha

D. Ramya Krishna

2 ST10 Data Warehousing & Data Mining

M. Lokesh Reddy

G. Venkatesh Babu

3 ST17 A DSP based On-Line UPS G. Siva Ramaiah

K. Nagaraju

4 ST18 Eyegaze Communication System S. Muni lakshmi

B. Uma Maheswari

5 ST19 A Survey on Artificial Intelligence

A. Neethravathi

M. Jagadeesh Chowdary

6 ST21 A Survey on Cloud Computing and

Applications

G. Prasanthi

J. Rekha

7 ST22 5G Mobile Technology S. Muni lakshmi

N. Bharati

8 ST23 A Survey of Routing Protocols in Mobile

Ad Hoc Networks and wireless sensors

C. R. Surendra Reddy

K. Ravi Babu

9 ST28 Bandwidth Estimation in Broadband

Access Networks

L. R. Manohar Reddy

10 ST30 5 Pen PC Technology R. Hemalatha

G. Priyamvadha

SESSION-AR1

November 9, 2012 (Friday)

Saaveri Conference Hall, SPMVV, Tirupati.

Time: 11.45 AM – 1.30 PM

Plenary Speech

S.No. Paper

Code Title Authors

1 AR02 An Efficient Id-Based Signature Scheme

With Batch Verifications

P. V. S. S. N. Gopal

T. Gowri

G. Swapna

P. Vasudeva Reddy

2 AR08 Text Clustering using Mixture Models

R. C. Saritha

Annarao kulkarni

3 AR42 Resolving Application Development Issues using

SOA

Y. Kiran Kumar

G. Sujatha

G. Jagadeesh Kumar

4 AR45 Binary Tree Structure Approach Based Digital

Watermarking

S. B. Sridevi

5 AR46 Mobility scenario-based Performance Evaluation

of Preemptive DSR Protocol for MANET

K. Sangeetha Supriya

Y. Mohana Roopa

6 AR47 Multimodal Biometrics – An Overview V. Sireesha

Dr. K. Sandhya Rani

7 AR55 Removing an Unnecessary Barrier in the

Composite Object Data Model

M. Ravi Prasad

8 AR56 Energy Efficient Zone Disjoint Shortest Multipath

Routing Protocol

K. Muralidhar

Dr. N. Geethanjali

9 AR62 Reducing The Correcting Cost Of Faulty Nodes In

Externally Managed Overlay Networks

V. L. Pavani

Dr. B. Sathyanarayana

10 AR64 A Hierarchical Pattern Matching Algorithm by

Using Intrusion Detection System

E. Gayathri

Dr. N. Geethanjali

11 AR91 Magnetic Resource Force Microscopy for

Reconstruction of H-B Sparse Fingerprint Image

Josphineleela. R

M. Ramakrishnan

12 AR93 An Elgamal Type Digital Signature Scheme

Over Circulant Matrices

B. Umaprasada Rao

R. Mohana Ramana

P. Vasudeva Reddy

SESSION-AR2 November 9, 2012 (Friday)

Venue: Dept. of Comupter Science, SPMVV, Tirupati. Time: 2.00 PM – 5.00 PM

Plenary Speech

S.No. Paper

Code Title Authors

1 AR20 New BEC Design for Efficient Multiplier C. Nageswararao

A. Kishore

B. Saroja

Munishankar

2 AR21 A Dual Covered Broadcast Technique with

Negative Acknowledgements to avoid

Piggybacking Neighbor Problems in Mobile

Adhoc Networks

D. J. Samatha Naidu

Dr. P. Chitti Babu

Dr. C. Shobha Bindu

Dr. A. Subramanyam

3 AR28 A Survey on Extracting the Patterns using

Different Techniques of Neural Network

P. Venkateswar Rao

A. Bhaskar

S. Ramaiah

4 AR34 A Survey on Implementation of Automated and

Integrated Data Sources in Key Word Based

Web Information Retrieval

P. Sunil Kumar Reddy

K. Suneetha

5 AR36 Security Tracing Anonymity In Wireless Mesh

Networks

M. B. Mukesh Krishnan

T. Balachander

6 AR39 Clogging Control by Using Congestion Free

Routers

T. Srikanth

7 AR40 Study on Dimensionality Reduction Techniques

and Applications

G. N. Ramadevi

Dr. K. Usha Rani

8 AR51 Quality of Service Aware Dynamic Web Service

Composition

P. Rajasekar

C. M. T. Karthigeyan

9 AR57 Neuro-Fuzzy Systems and Applications – A

Review

K. Vijaya Sri

Dr. K. Usha Rani

10 AR68 Relevance Feedback for Content Based Image

Retrieval Based on Multitext on Histogram and

Microstructure Descriptor

K. Kranthi Kumar

Dr. T. Venu Gopal

M. Rama Krishna

11 AR71 A Cloud Frame Work for Monitoring People

Health

R. Nagarjuna Reddy

L. Narasimha Sai Kiran

G. S. Prasada Reddy

12 AR84 A Novel Approach for Clustering Web Services

and Rest Services Using WSDL

N. P. Shangaranarayanee

Dr. T. Rajendran

P. Krishna Sankar

13 AR85 Attacks and Challenges in Wireless Mesh

Networks

K. Venkata Ravi

P. Nageswararao

Dr. Sanjay Kumar

14 AR86 Data Preprocessing for efficient External Sorting

S. Hrushikesava Raju

Dr. T. Swarna Latha

SESSION-AR3 November 9, 2012 (Friday), Time: 2.00 PM – 5.00 PM

Venue: Dept. of Computer Science, SPMVV, Tirupati.

Plenary Speech

S.No. Paper

Code Title Authors

1 AR10 A Sharp and High Resolution Image Generation

Using DWT and SWT

K. Vijay

Sk. Mujafar Ahmed

2 AR15 Digital License Plate Identification

K. Vijay

K. Sundar Srinivas

3 AR16 Model – RF Based Classroom Intelligence

Computation

K. Sundar Srinivas

M. Naga Lakshmi Kalyani

4 AR23 To Analyze Performance in Reactive Routing

Protocol Using Mobile Ad-hoc Networks

K. Venkararamana

S. Hemasri

K. Muniramaiah

5 AR24 To analyze difference between AODV and

DSDV Routing Protocols in MANETs

K. Venkata Ramana

P. C. Devi

B. Chaithanya

6 AR25 Determining the Positioning Algorithm for

Fingerprinting using WLAN

Indu Maurya

Ashish Maurya

Priyanka Maurya

7 AR35 Comparative Study of Routing Techniques,

Their Attacks and Prevention methods in

MANET

MD Sirajul Huque

8 AR63 Providing Location-Aware End-to-End

Secure communication in Wireless Sensor

Networks

T. Kesava Rao

C. Viswanadh

G. Suresh

9 AR75 HYBRID Markov model is used for tracking in

MANET with structure free approach

M. ChandraMouli Reddy

K. Mahesh Kumar

J. Sreekanth Reddy

10 AR76 Ontology Model is Used for Gathering

Multidimensional Analysis of Web Information

in Single Hierarchy

K. Mahesh Kumar

M. ChandraMouli Reddy

J. Sreekanth Reddy

11 AR77 Estimating Marketing Analysis for Customer

Behavior with the Help of Bayesian

Classification

K. Mahesh Kumar

M. Chandra Mouli Reddy

J. Sreekanth Reddy

12 AR87 An efficient Fault-Tolerance Technique using

Check-pointing and Replication in Grids using

Data Logs

S. Dilli Babu

Ch. Ramesh Babu

Dr. Ch. D. V. Subba Rao

13 AR88 Comparison study of an efficient Algorithm for

Discovering Maximum Frequent Item sets

P. B. Archana

Dr. A. Ram Mohan Reddy

14 AR89 A Refuge Business model for Cloud

Computing using novel AES Approach

D. Prathima

Dr. P. Venkata Subba Reddy

15 AR90 A Baseline System for Telugu – English

Translation Using Moses

D. Praveena

Dr. A. Ram Mohan Reddy

SESSION-AR4

November 10, 2012 (Saturday)

Venue: Department of Computer Science, SPMVV, Tirupati.

Time: 10.00 AM – 01.00 PM

Plenary Speech

S.No. Paper

Code Title

Authors

1 AR04 A Survey On Web Recommender Systems

K. Suneetha

P. Sunil Kumar Reddy

2 AR18 Hypervisor Security in Microsoft Private Cloud S. Reddy Prasad

Dileep Jyothiraj

3 AR27 Applying Cloning process in Agile

Development

M. Sowmya Vani

D. T. T. Vijaya Kumar

4 AR41 Ad Hoc Routing for Bluetooth Using Epidemic

Algorithm

A. Sai Suneel

5 AR43 Analyzing the Detection of Active Attacks in

MANETs

P. Nirupama

G. M. Padmaja

6 AR58 WIRELESS NETWORKS: A Comparison and

Classification based on Outlier Detection

Methods

T. Kavitha

A. Chandra

7 AR59 HONEY POTS: A New Mechanism for

Network Security

A. Chandra

K. Lalitha

8 AR60 Effective Implementation Of Query

Optimization Through Performance Tuning

Techniques On Web

P. Jyotsna

P. Sunil Kumar Reddy

Prof. P. Govindarajulu

9 AR69 Information Technology Related Innovations in

Every Business Function

K. Divya

10 AR74 Image Denoising Using Fusion Based Curvelts

and Wavelets Transform

P. Subba Lakshmi

S. Fairoz Sulthana

11 AR78 A Crypto Virology: A Deadly Combination S. Heera

P. Vaishnavi

S. Surekha

12 AR80 An Improved K-means Clustering

Algorithm with refined initial Centroids

G. Pradeepini

Prof. S. Jyothi

13 AR83 Prediction and Classification of Speech in

Speech Recognition System

N. Usha Rani

SESSION-AR5

November 10, 2012 (Saturday)

Venue: Department of Computer Science, SPMVV, Tirupati.

Time: 10.00 AM – 1.00 PM

Plenary Speech

S.No. Paper

Code Title Authors

1 AR11 Various Approaches of Vision-Based Deep Web

Data Extraction (VDWDE) and Applications

M. Lavanya

M. Dhanalakshmi

2 AR29 Spatial Knowledge for Disaster Identification R. Sanjeev Reddy

J. Kishore Kumar

A. V. Sriharsha

3 AR30 Information Security Using Biometric Methods K. Usha Sri

4 AR32 Mining of Frequent Positive Opinions by Using

Mathematical Techniques

M. Dhanalakshmi

M. Lavanya

5 AR48 A Privacy Preserving Clustering Method Based on

Fuzzy Approach and Random Rotation

Perturbation

M. Naga lakshmi

Dr. K. Sandhya Rani

6 AR49 A Survey on various Pattern recognition methods

for the Identification of a different types of Images

V. Sucharita

Dr. S. Jyothi

7 AR53 Analysis Of (2,2) Visual Cryptographic Scheme

M. Nirupama Bhat

Dr. K. Usha Rani

8 AR65 Data Transformation Services P. S. Sailaja

9 AR67 Augmented Reality Based Approach In

Educational Field Using AR Books

D. Abhishekh

B. Ramakantha Reddy

R. Raja Kumar

10 AR70 Duplicate Detection of Query results from Multiple

Web Databases

G. Bala Krishna Priya

11 AR73 Comparative Study of Different Approaches of

Spectral Clustering on Graphs

G. Sujatha

Dr. K. Usha Rani

12 AR79 Design of Low Voltage Switched Op-amp with

rail-to-rail to input common mode range

N. Kusuma

P. Hemachandu

13 AR82 A Study of Semantic Web for E-Business and E-

Learning

J. Murali

SESSION-AR6

November 10, 2012 (Saturday)

Venue: Department of Computer Science, SPMVV, Tirupati.

Time: 2.00 PM – 5.00 PM

Plenary Speech S.No. Paper

Code Title

Authors

1 AR01

Finding Number of Cluster Services in

Educational Cloud Using EDBE

A. Srinivasulu

Dr. Ch. D. V. Subbarao

M. Sreedevi

K. Lalitha

2 AR05 Future Trends of Text Clustering S. Suneetha

Dr. M. Usha Rani

3 AR07 A study on Privacy Preserving Techniques used

in Cloud Computing Services

P. Gowthami

B. Lavanya

4 AR12 Study on Various Methods for Text Clustering

R. Rajani

V. Sireesha

5 AR14 Weighted Association Rule Mining- A Review M. Kalpana Devi

Dr. M. Usha Rani

6 AR19 Overview of Web Components

Dr. G. Sreedhar

7 AR26 Learn++ using Dynamic Weighting Ensembles G. T. Prasanna Kumari

8 AR37 Development of a Concordance for Sanskrit

using Rule-based Approach

V. Sethuram

K. Samkeerthy

Dr. R. J. Rama Sree

9 AR44 Modeling an Expert System for Diagnosis of

Gestational Diabetes Mellitus Based on Risk

factors

K. Vijaya Lakshmi

E. Sreedevi

Prof. M. Padmavathamma

10 AR54 Contrast Stretching Enhancement Techniques

for Acute Leukemia Images

V. Raja Rajeswari

N. Ramesh

11 AR66 Data on The Road in Intelligent Transportation

Systems

K. Bhargavi

Dr. S. Jyothi

12 AR92 Classification of Agriculture Land using Spatial

Data mining Techniques based on Remote

Sensing Images with GIS

M. Sirish Kumar

Dr. S. Jyothi

SESSION-AR7

November 10, 2012 (Saturday)

Venue: Department of Computer Science, SPMVV, Tirupati.

Time: 2.00 PM – 5.00 PM

Plenary Speech

S.No. Paper

Code Title

Authors

1 AR03 Diagnosis of Glomerulonephritis Based on the

Physical Symptoms and Clinical observations

of the Blood Samples Using An Artificial

Neural Network

G. Sumana

Dr. G. Anjan Babu

2 AR06 Evaluation of The Signaling Performance of

Virtual Link Setup With the Quality of

Services

K. Sailaja

N. Nagarjuna

3 AR09 The Data Mining Technique – Trend Analysis

on Expenditure & Households

Registered/Working NREGS data of A.P.

Dr. M. Usha Rani

4 AR13 Research Challenges in Cryptography and its

Applications

P. Krishna Chaitanya

K. Priyanka

5 AR17 Experiments in Probabilistic Context Free

Grammar for URDU Language

M. Humera Khanam

6 AR22 A Framework for Context-aware and Emotion-

aware AmI Systems

J. Madhan

V. S. Sandhya

7 AR33 Developing a Middle Ware Architecture for

Health Care

T. Sandhya

8 AR38 Stanford POS Tagger

G. Prasanna

A. Vinaya simha

Dr. R. J. Rama Sree

9 AR50 Secure Data Transfer Using Audio

Steganography – A Survey

T. Anuradha

Dr. K. Usha Rani

10 AR61 A Novel Dynamic Route Selection Algorithm

for Secure Data Transmission

B. Muneendra Nayak

Dr. V. Ragunatha Reddy

Dr. E. Madhusudhana Reddy

11 AR72 A Parameterized Runtime Analysis of

evolutionary algorithm for minimization in

Euclidean TSP

G. Nagalakshmi

Dr. S. Jyothi

12 AR94 Wavelet Transform Based Dental Image

Registration for Aligning Dental Radiographs

Dr. A. Yaswanth Kumar

Dr. R. Seshadri

AR-01 Finding Number of Cluster Services in Educational Cloud using EDBE

Srinivasulu Asadi1, Dr. Ch. D. V. Subbarao

2, M. Sreedevi

3 and K. Lalitha

4

1Dept. of IT, SVEC, Tirupati. [email protected] 2Dept. of CSE, SVUCE, Tirupati. [email protected]

3Dept. of MCA, S. V. University, Tirupati. [email protected] 4Dept. of CSSE, SVEC, Tirupati. [email protected]

Abstract: One of the major problems in cluster analysis is the determination of the number of

cluster services in Educational Cloud. In this paper, we implement a new method for determining

the number of clusters called Extended Dark Block Extraction (EDBE), which is based on an

existing algorithm for Visual Assessment of Cluster Tendency (VAT) of a data set. Educational

Cloud is a combination of three types of Clouds such as Private, Public and Hybrid. This cloud

provides all types of Services such as Software as a Service, Platform as a Service and

Infrastructural Services. To accommodate an increasing need for high performance computing,

we wish to create Educational Cloud. This is a multi-departmental effort that will greatly benefit

both undergraduate, graduate students and educational institutions. Access to the Student cluster

will facilitate student research in Computer Science, Information Technology and more. Cloud

computing and Software as a Service infrastructure are becoming important factors in E-

commerce and E-business processes. Users may access simultaneously different E-services

supplied by several providers. An efficient approach to authenticate and authorize users is

needed to avoid problems about trust and redundancy of procedure. This educational cloud helps

poor students, society and educational institutions. It provides services such as software as a

service like student laboratory subject software namely C, C++, Java, Multimedia and Adobe

Photoshop. Platform as a service such as .Net, Java, Apex etc. Infrastructure as a service like

1MB, 1GB, and 1TB spaces etc. Educational cloud gives platform for all students, society and

educational institutions with free of cost. The research challenges involve in educational cloud

are security, elasticity, scalability, privileges, services etc. information etc.

Keywords: Clustering, EDBE, VAT, Cloud Security, Data Centre, Educational Cloud; Hybrid

Cloud IaaS; PaaS; Private Cloud; Public Cloud and SaaS.

AR02 An Efficient Id-Based Signature Scheme With Batch Verifications

P. V. S. S. N. Gopal1, T. Gowri

2, G. Swapna

1 and P. Vasudeva Reddy

1

1Dept. of Engg. Mathematics, AU. College of Engineering, Andhra University, Viakhapatnam. 2Dept. of Electronics and Communications Engineering, GIET, GITAM University, Visakhapatnam.

Abstract: Many group oriented applications and multicast communications often need to verify

which group members have sent/received a message. However, individual verification of signed

messages would require a significant computation cost. A secure signature scheme with

supporting batch verifications extremely improves the performance. In this paper we propose an

efficient ID-based digital signature scheme, which supports batch verifications, using bilinear

pairings over elliptic curves. We prove that the proposed scheme is secure against existential

forgery under adaptive chosen message and ID attack in the random oracle model with the

assumption that the Computational Diffie-Hellman Problem is hard. Finally, we compare our

scheme with the related schemes.

Keywords: ID-based cryptography, Bilinear Pairings, Digital Signature, CDH Problem.

AR03 Diagnosis of Glomerulonephritis Based on the Physical

Symptoms and Clinical observations of the Blood Samples Using An

Artificial Neural Network

G. Sumana1 and Dr. G. Anjan Babu

2

1Programmer, Computer Center, SPMVV, Tirupati. [email protected] 2Associate Professor, Dept. of Computer Science, SVU, Tirupati. [email protected]

Abstract: An artificial neural network (ANN) is a computational model that attempts to account

for the parallel nature of the human brain. Neural networks provide significant benefits in

medical research. They are actively being used for such applications as locating previously

undetected patterns in mountains of research data, controlling medical devices based on

biofeedback, and detecting characteristics in medical imagery. The main purpose of this study is

to construct an Artificial Neural Network for the differential diagnosis of kidney disease,

glomerulonephritis based on the physical symptoms and Clinical tests conducted on blood

samples of different individuals in the lab. In this study Back propagation feed forward neural

Network is constructed, trained and tested using Delta Learning Rule.

Keywords: Artificial neural networks, Glomerulonephritis, Computer-aided medical diagnosis,

multilayer feed forward neural network.

AR-04 A Survey on Web Recommender Systems

K. Suneetha1 and P. Sunil Kumar Reddy

2

1Sr. Lecturer, Dept. of M.C.A, SVEC, Tirupathi. [email protected] 2Research Scholar, Dept. of Comp. Science, S.V. University, Tirupathi. [email protected]

Abstract: One of the application areas of data mining is the World Wide Web (WWW or Web).

The amount of information available on the Web is growing rapidly, as well as the number of

Web sites and Web pages per Web site. Consequently, it has become more difficult to find

relevant and useful information for Web users. Web usage mining is concerned with guiding the

Web users to discover useful knowledge and supporting them for decision-making. Web

recommendation is a very active research field and new approaches related to its application

appear on a regular basis. The Recommender Systems are applied in many areas such as: web-

browsing, information filtering, net-news or movie recommender and e-Commerce. In this paper,

a survey work is done in the field of web recommendation system.

Keywords: Personalization, content-based filtering, collaborative-based, hybrid-based

approach, recommender system.

AR-05 Future Trends of Text Clustering S. Suneetha

1 and Dr. M. Usha Rani

2

Research Scholar1, Head and Associate Professor2, Department of Computer Science, SPMVV, Tirupati.

[email protected], [email protected]

Abstract: Text Mining, a variation of Data Mining that extracts knowledge from very large text

corpus. „Text Clustering‟ is the organization of a collection of text documents into clusters based

on similarity. The main goal of clustering is to maximize both the homogeneity within each

cluster and heterogeneity among different clusters. This paper explores some basics of Text

Clustering, along with the importance, properties and variations of evolutionary clustering. It

also outlines the recent works in the field of Text Clustering in accordance with dynamic data

and frequent item sets keeping an eye towards the future trends of text clustering. Exploiting an

effective and efficient method in Evolutionary Text clustering to achieve better snapshot

clustering quality at lower history cost would be an essential direction of research.

Keywords: Text Mining, Text Clustering, Incremental clustering.

AR-06 Evaluation of The Signaling Performance of Virtual Link Setup

With The Quality of Services

K. Sailaja1 and N. Nagarjuna

2

1 Head of MCA, CREC, Tirupati. [email protected] 2 Academician, Dept. of CSE, CREC, Tirupati. , [email protected]

Abstract: While the resource reservation basically takes only a small amount of time, the setup

and tear down of virtual links take longer due to shell script execution. Instead of using a

resource reservation protocol and a separate tunnel setup protocol we combined both protocols

leading to a more efficient solution, which can be additionally secured by using the session

authorization object. In this paper, we proposed a Virtual Link Setup Protocol (VLSP) that

permits an authenticated and dynamic setup of virtual links with dedicated Quality-of-Service

guarantees. We described the design and implementation of VLSP and evaluate its signaling

performance. The performance is more fine-grained evaluations regarding the overhead induced

by the creation of a tunnel for the virtual link. The evaluation results show that integrity

protection of virtual link setup signaling is possible with small computational overhead.

AR-07 A study on Privacy Preserving Techniques used in

Cloud Computing Services

P. Gowthami and B. Lavanya

Faculty in Dept. of Computer Science, SPMVV, Tirupati.

[email protected], [email protected]

Abstract: Cloud computing is an Internet-based computing, whereby shared resources, software

and information are provided to computers and other devices on demand. People can only enjoy

the full benefits of cloud computing, each cloud service will exchange data with other cloud.

When the data is exchanged between clouds there exists the problem of privacy. Data

confidentiality and access privacy protection for data management and query processing services

are in the cloud. An understanding of current research and systems is essential for designing new

protection techniques and building secure data services. In this I listed some privacy preserving

techniques used in cloud computing services.

Keywords: Cloud Computing, Privacy Preserving, Data Management, Query Processing.

AR-08 Text Clustering using Mixture Models

R. C. Saritha1 and Annarao kulkarni

2

1Senior Technical Officer, 2Principal Technical Officer, C-DAC Knowledge Park, Bangalore.

[email protected], [email protected]

Abstract: The data generated after statistical process is effective and describes the data by

finding statistical model that best fits the data, where the statistical model is described in terms of

distribution and set of parameters for that distribution. Mixture models are particular kind of

statistical models and view the data as a set of observations from a mixture of different

probability distributions. Each distribution corresponds to a cluster and parameters of each

distribution provide description of corresponding cluster, typically in terms of its center and

speed. This paper explains the state of art about the text clustering techniques and also about well

known k-means algorithm for text documents and Expectation–Maximum (EM) algorithm,

which estimates mixed model parameters using maximum likelihood. The Experiment results of

both K-means and EM algorithm on different datasets shows that mixture models are more

general and find clusters of different sizes and shapes than k-means.

Keywords: Text mining, Clustering, k-means, Mixture models, Expectation–Maximum (EM)

algorithm, Maximum Likelihood estimation, Gaussian mixture model.

AR-09 The Data Mining Technique – Trend Analysis on Expenditure

& Households Registered/Working NREGS Data of A.P.

Dr. M. Usha Rani, Associate Professor, Dept. of Computer Science, SPMVV, Tirupati.

Abstract: Data mining merged the ideas from statistics, machine learning, databases and parallel

computing. The data mining techniques such as characterization, discrimination, classification,

clustering, outlier and trend analysis, etc. may apply on National Rural Employment Guarantee

Scheme (NREGS) data of Andhra Pradesh. Expenditure on 22 districts for unskilled labor,

material and contingency are collected separately from January 2010 to December 2011(month-

wise data). The hidden patterns and information find from trend analysis about the expenditure

on 22 districts of Andhra Pradesh for unskilled labor, material and contingency are presented in

this paper. From 2006 to 2011 year caste-wise households that are registered, working from these

registered households are collected for 22 districts of AP. The hidden patterns and information

find from trend analysis about the households registered/working is also presented in this paper.

This information may be helpful to the government for budget allocation.

Keywords: NREGS Database, Expenditure analysis, Households registered/working analysis,

Trend analysis.

AR-11 Various Approaches of Vision-Based Deep Web

Data Extraction (VDWDE) and Applications

M. Lavanya1 and M. Dhanalakshmi

2

1Assistant Professor(SL), MCA Dept, SVEC, A.Rangampet, Tirupati. [email protected] 2Assistant Professor, CSSE Dept., SVEC, A. Rangampet, Tirupati. [email protected]

Abstract: Web Data Extraction has become a very serious problem especially having vision

based features. We have studied different approaches in a lane range of application domains.

Many approaches to extracting vision based data from the Web have been designed to solve

specific problems and operate in web application domains. Other techniques reuses in the

meadow of Information Extraction. This paper aims in providing structured and comprehensive

vision-based features of research efforts made in the field of Web Data Extraction. The overview

of our work is to present a cataloguing of vision based approaches in terms of the applications

for which they have been working. This differentiates our work from other researcher‟s efforts to

organize vision-based approaches on the basis of the algorithms, techniques and tools they use.

We divide vision based Web Data Extraction approaches into different kinds along with an

application how the data regions are extracted from a deep web page.

Keywords: vision-based features, web data extraction, Enterprise applications, Social web

applications.

AR12 Study on Various Methods for Text Clustering

R. Rajani1 and V. Sireesha

2

1HOD & Assoc. Professor, Dept. of MCA, NEC, Nellore. [email protected], 9502496465. 2Asst. Professor, Dept. of MCA, NEC, Nellore. [email protected], 9030080273.

Abstract: Clustering text documents into different category groups is an important step in

indexing, retrieval, management and mining of abundant text data on the Web or in corporate

information systems. Text clustering task can be intuitively described as finding, given a set

vectors of some data points in a multi-dimensional space, a partition of text data into clusters

such that the points within each cluster are similar to each other. Good text clustering enables

better information services by browsing and organizing documents into meaningful cluster

hierarchies and provides a useful complement for traditional text search engines when key-word

based search returns too many documents. Among others, the challenging problems of text

clustering are big volume, high dimensionality and complex semantics. Herewith, we present the

study of few methods involved in text clustering.

Keywords: document clustering, document representation, rough sets, text mining.

AR-13 Research Challenges in Cryptography and its Applications

P. Krishna Chaitanya1 and Ms. Priyanka Koduru

2

Senior S/W Engineer, IGATE Global Solutions, Bangalore.

Lecturer, Dept. of CSE, School of Engineering & Technology

SPMVV(Women‟s University), Tirupati – 517502.

Abstract: Cryptography is an indispensable tool for protecting information in computer systems.

In this paper some research challenges that are presented which may be helpful to the researchers

connected to fields like Data mining, Biometrics, Networks and Network security. The

challenges are like - low cost and low power solutions(Ambient Intelligence); highly efficient

solutions for applications such as bus encryption, encryption in Terabit networks; high security

solutions: for e-voting, e-health; secure watermarking techniques; need to build cryptosystem

that offer long term security, Provable security: cryptography has been very successful in

developing security models and security proofs within these models based on a limited set of

assumptions; Digital right management: several techniques such as fingerprinting and

watermarking; Privacy: diffusion of sensing, location based services, explosive growth of storage

capacity and communication mechanisms, and data mining technologies present a major risk to

privacy.

Keywords: Ambient Intelligence, Digital data management, Provable security, Privacy.

AR-14 Weighted Association Rule Mining- A Review

M. Kalpana Devi1 and M. Usha Rani

2

1Research Scholar, 2Associate Professor, Head, Dept. of Computer Science, SPMVV, Tirupati.

Abstract: Traditional association rule mining consider support confident measures to find out

frequent item sets, it assumes all items are having equal significance. Where as weighted

association rule mining assigns weights to items based on different aspects. Because researchers

are more concerned with qualitative aspects of attributes (e.g. significance), as compared to

considering only quantitative ones (e.g. number of appearances in a database etc). Because

qualitative properties are required in order to fully exploit the attributes present in the dataset. In

last few years a number of weighted associative rule mining algorithms have been proposed, i.e.

WAR, WARM, WFIM, WIP, WUARM, FWARM and others. These algorithms employ

different rule discovery, rule ranking, rule pruning, rule prediction methods. This paper focuses

on surveying and comparing the weighted associative rule mining techniques with regards to the

above criteria.

AR-17 Experiments in Probabilistic Context Free Grammar for Urdu Language

M. Humera Khanam, Associate Professor, Dept. of CSE,

SVU College of Engineering, Tirupati. [email protected]

Abstract: In this paper we describe the expansion of probabilistic context free grammar for Urdu

language, we did some experiments in probabilistic context free grammar for Urdu language,

extraction of CFG rules through The Penn Treebank, evaluation of PCFG from CFG. This PCFG

is further useful for parsing the Urdu Sentences. The Tree-bank based grammar is the best

technique for building up the PCFG for language through some easy and understandable steps

as compared to theoretical. A PCFG can be used to estimate a number of useful probabilities

concerning a sentence and its parse-tree(s). The resulting Penn Treebank based PCFG is widely

used in natural language processing, speech recognition, and integrated spoken language systems

as well as in theoretical linguistics.

Keywords: PCFG, Urdu Language, Penn tree bank.

AR-18 Hypervisor Security in Microsoft Private Cloud

S. Reddy Prasad and Dileep Jyothiraj Project Assistants, DST-PURSE Centre, S.V. University, Tirupati. [email protected]

Abstract: When you move from server consolidation to using virtualization to create a public,

private or hybrid cloud computing environment, you move from a traditional datacenter to a

dynamic, service oriented and focused cloud deployment. When virtualization is used in cloud

computing, you will see that the management infrastructure you used for your physical server-

based deployment will fall short virtualization based cloud infrastructure. In a traditional

datacenter, automation is not usually such a major component unless the number of client or

server operating systems to be deployed and the administrative overhead would be

overwhelming without some method of automation. In general, in today‟s Local Area Network

(LAN) based datacenter, setting up new physical servers includes at least some manual steps

performed by the admin. In contrast, in a cloud environment, the Operating System (OS) must be

highly automated to support several of the key tenets of cloud computing itself. The hypervisor

should be invisible to the network, with the possible exception of traffic destined to the

hypervisor management interface. The probability is low that the hypervisor will be attacked in

the near future because both the vulnerability of the hypervisor and the probability of an attack

are low at this time. However, there is a good chance that this will change in the future as

hackers begin to focus their efforts on hypervisors. Another security issue that‟s related to

virtualization deals with the allocating and de-allocating of resources in an elastic environment,

which might include things such as local storage associated with Virtual Machines (VMs). If

data is written to physical media or to memory and it is not cleared before that storage is

reallocated to another VM, then there is a chance for data leakage. Of course, these problems are

not unique to cloud environments and there are well-defined mitigations enabled by all

commonly used operating systems.

Keywords: Cloud, Virtual Machine, Security, Hypervisor, Network, etc.

AR-19 Overview of Web Components

Dr. G. Sreedhar, Assistant Professor, Department of Computer Science

Rashtriya Sanskrit Vidyapeetha(Deemed University), Tirupati. [email protected]

Abstract: In present days the internet has quietly become the body of business world with web

applications as the brains. The web is more and more used as a platform for full-fledged,

increasingly complex application, where a huge amount of change-intensive data is managed by

underlying database systems. The complete list of web components include: Links, Forms,

Cookies, Web Indexing, Dynamic Interface Components, Programming Language, Database,

Navigation, Graphics, Contents, Platform, Browsers, Settings and Preferences and Connection

Speed. These web components play important role in web design process:

AR-20 New BEC Design for Efficient Multiplier

Nageswararao chintapanti1, Kishore. A

1, Saroja Boda

1 and Munishankar

2

1Dept. of ECE, Siddartha Institute of Science & Technology, Puttur. [email protected], [email protected],

[email protected]. 2Assistant Professor, Dept. of ECE, Siddartha Institute of Engineering & Technology,

Puttur. [email protected]

Abstract: In this paper the performance of different types of adders are analysed. And carry

select adder (CSLA) is the lowest delay compare to other adders. Carry select adder is one of

the fastest adders used in many data-processing processors to perform fast arithmetic functions.

From the structure of the CSLA, there is a possibility for increasing the speed and reducing the

area and in the CSLA. This work uses a simple and efficient gate- level modification to

significantly reduce the area and power of the CSLA. Based on this modification 8-, 16-, 32-,

and 64-b CSLA architecture have been developed and compared with the regular CSLA

architecture. The proposed design has increased speed and reduced area and power as compared

with the regular CSLA with only a slight increase in the delay. This work evaluates the

performance of the proposed designs in terms of delay, speed(frequency)and memory. The

results analysis shows that the proposed CSLA structure is better than the regular CSLA. And it

is implemented in multiplier as application for efficient performance.

Keywords: Carry select adder(CSLA), Carry save adder, Carry skip adder, RCA, BEC.

AR-21 A Dual Covered Broadcast Technique with Negative

Acknowledgements to avoid Piggybacking Neighbor

Problems in Mobile Adhoc Networks

D. J. Samatha Naidu1, Dr. P. Chitti Babu

2, Dr. C. Shobha Bindu

3 and Dr. A. Subramanyam

4

1Assistant professor, MCA Dept, APGCCS, Rajampet, 9010581011. [email protected] 2Professor & Principal, APGCCS, Rajampet, 9441738577. [email protected]

3Associate professor, CSE Dept, JNTUA, Anantapur, 9966258359. [email protected] 4Profesor & HOD, CSE Dept, AITS(autonomous), Rajampet.

Abstract: In this paper, we propose Dual Covered broadcast with Negative

Acknowledgements. Reliability and packet delivery ratio are of key concern in Mobile Ad hoc

Networks. This algorithm takes advantage of redundant data packets in the network to achieve

high delivery ratio. The proposed algorithm achieves reliability avoiding problems in

broadcasting i.e., ACK implosion and Broadcast storm. Piggybacking neighbor information on

data packets reduces broadcast overhead and delay as compared to Double Covered Broadcast

algorithm. The use of NACK messages ensures reliable broadcasting. Some of the advantages of

this algorithm are: only the forwarding nodes transmit the packet so that the broadcast collision

and congestion are reduced; the retransmissions of forwarding nodes treated as ACKs by sender,

avoids the ACK implosion problem and the loss.

Keywords: Broadcast, forwarding node, reliability, ACKnowledgement.

AR-22 A Study on a Framework for Context-aware and

Emotion-aware AmI Systems

J. Madhan1 and V. S. Sandhya

2

1Project Manager, KGD Architectural Consultancy, Chennai.

[email protected] 2Assistant Professor, Meenakshi College of Engineering, Chennai.

[email protected]

Abstract: ISTAG (Information Society and Technology Advisory Group) has developed the

concept of Ambient Intelligence (AmI) in the late 1990s. AmI is an interdisciplinary field that

brings together ubiquitous computing, intelligent environments, context-awareness and emotion-

awareness technologies. The objective of this paper is to discuss about the framework for

constructing context-aware and emotion-aware AmI systems. In context-aware application

framework, issues such as the need to develop context ontologies, context servers, and to

maintain the user context information privacy are described. In emotion-aware application

framework, all the components that are needed to develop emotion-aware AmI systems are

described. The AmI system that are developed using the given two frameworks facilitate human

contact, increases the quality of work, ensures consistency, makes easy to live with and are

controllable by ordinary people.

Keywords: AmI, ubiquitous computing, ontologies, context-awareness, emotion-awareness.

AR-26 Learn++ using Dynamic Weighting Ensembles

G. T. Prasanna Kumari, Asso.Prof, Dept of CSE, Gokula Krishna College of Engg,

Sullurpet-524121. [email protected]

Abstract: In this paper, we propose an incremental learning model for ensemble classifier

systems. Learn++, an ensemble of classifiers based algorithm originally developed for

incremental learning, and now adapted for information/data fusion applications. Recognizing the

conceptual similarity between incremental learning and data fusion, Learn++ follows an

alternative approach to data fusion, i.e., Generates each classifier of the ensemble for each data

set coming from a different source, and appropriately combine the classifier outputs to take

advantage of the additional information in subsequent data sources using “weighted majority

voting” (WMV) combination rule. Learn++ creates additional classifiers trained on the new data

until the old classifiers are Out-voted, when classifying an instance from a new class. In order to

overcome the problem of out-voting when new data comes and to create new classifiers, we

propose Learn++ using dynamic weighting ensemble. This paper introduces an incremental

learning algorithm framework using dynamic weighting ensembles to effectively learn new

batches of data appearing over time without the need of retraining. This algorithm help

classifiers to learn additional information from new batches of data incrementally while

preserving previously acquired knowledge. We demonstrate that the proposed incremental

learning algorithm using dynamic weighting scheme has comparable performance with fixed

weighting scheme. When a new batch of data becomes available, a new ensemble of basic

classifiers is built solely on it so that the new information can be effectively extracted, without

interfering with existing classifiers. Another advantage is that the training process has much

better flexibility than the retraining strategy.

Keywords: Incremental learning, data fusion, learn++, weighted majority voting.

AR-27 Applying Cloning process in Agile Development

M. Sowmya Vani and D. T. T. Vijaya Kumar

Asst. Professors, Department of MCA, SVEC, A.Rangampet, Tirupati.

[email protected], 9959505412. [email protected], 9985171776.

Abstract: Agile methodology is an approach used for the development of a project which helps

to respond to the unpredictability of building software through incremental, iterative work

cadences. These methodologies are used to deal with the situations where the waterfall model

fails. In Agile development rapid construction is needed, so developer has to keep more efforts.

To reduce the burden for the developer we are proposing a technique called cloning. Duplication

or copying a fragment and reuse with or without any modifications is a well-known clone

concept in software maintenance. Several studies show that about 5% to 20% of software

systems can contain duplicated fragments, which are basically the results of copying existing

fragments. In this paper, we are proposing the applying of cloning process in agile development.

Keywords: Agile design practices, Cloning, Code Cloning, Design Cloning, Clone detection.

AR-28 A Survey on Extracting the Patterns using Different Techniques of

Neural Network

P. Venkateswar Rao ME(Ph.D)1, A. Bhaskar ME

2 and S. Ramaiah

3

1Professor & Head, 3M.Tech. Student, Dept. of CSE, ASIT, GUDUR. [email protected], [email protected]. 2Asst. Professor, Dept. of CSE, ASCET, GUDUR. [email protected]

Abstract: In the present day we have seen a rapid growth in all fields of science, business,

medicine, etc. The same rate of growth in the processing power of evaluating and analyzing the

data did not follow this massive growth. Due to this phenomenon, a tremendous volume of data

is still kept without being studied. Data mining tries to ease this problem, proposes some

solutions for the extraction of significant and potentially useful patterns from these large

collections of data. There are many technologies available to data mining practitioners, including

Artificial Neural Networks, Regression, and Decision Trees. The application of neural networks

in the data mining has become wider. Although neural networks may have complex structure,

long training time, and uneasily understandable representation of results, neural networks have

high acceptance ability for noisy data and high accuracy and are preferable in data mining. In

this paper the data mining based on neural networks is researched in detail, and the key

technology and ways to achieve the knowledge based on neural networks are also researched.

Keywords: neural networks, knowledge, patterns, data mining.

AR-29 Spatial Knowledge for Disaster Identification

R. Sanjeev Reddy1, J. Kishore Kumar

2 and A. V. Sriharsha

1Research Scholar, S.V.University, Tirupathi. [email protected] 2Lecturer in CS, S.G.Govt Degree College, Piler. [email protected]

3Research Scholar, S.V.University, Tirupathi. [email protected]

Abstract: Recent developments in information technology have enabled collection and

processing of vast amounts of personal data, business data and spatial data. It has been widely

recognized that spatial data analysis capabilities have not kept up with the need for analyzing the

increasingly large volumes of geographic data of various themes that are currently being

collected and archived. On one hand, such a wealth of data holds great opportunities for

geographers, environmental scientists, public health researchers, and others to address urgent and

sophisticated geographic problems, e.g., global change, epidemics etc,. Our study is carried out

on the way to provide the mission-goal strategy (requirements) to predict the disaster. The co-

location rules of spatial data mining are proved to be appropriate to design nuggets for disaster

identification and a framework has been suggested. Principal Component Analysis is a statistical

method for identifying patterns.

Keywords: spatial data mining, collocation rule mining, PCA.

AR-30 Information Security Using Biometric Methods

K. Usha Sri, Lecturer, Department of Microbiology, S. G. Govt PG College, Piler, INDIA – 517 214.

Abstract: Information security plays an important role in the field of Information Technology.

There are many tools and techniques that can support the management of information security.

The present day techniques for information security which involves the use of passwords and

PIN(Personal Identification Number )suffer from several limitations. With Several hackers and

unauthorized persons continually working on how to steal the information, there is always a need

to improve the security of the system. This paper highlights the need of Biometric methods can

provide a much a more security, accurate and reliable user authentication method to provide an

authorized access to information.

AR-32 Mining of Frequent Positive Opinions by Using

Mathematical Techniques

M. Dhanalakshmi1 and

M. Lavanya

2

1Assistant Professor, CSSE Dept., SVEC, A. Rangampet, Tirupati. [email protected] 2Assistant Professor(SL), MCA Dept, SVEC, A.Rangampet, Tirupati. [email protected]

Abstract: In recent years the sizes of databases has increased rapidly. This has led to a growing

interest in the development of tools capable in the automatic extraction of knowledge from data.

The term Data Mining, or Knowledge Discovery in Databases, has been adopted for a field of

research dealing with the automatic discovery of implicit information or knowledge within

databases. Several efficient algorithms have been proposed for finding frequent itemsets and the

association rules are derived from the frequent itemsets, such as the Apriori algorithm. These

Apriori-like algorithms suffer from the costs to handle a huge number of candidate sets and scan

the database repeatedly. A frequent pattern tree (FP-tree) structure for storing compressed and

critical information about frequent patterns is developed for finding the complete set of frequent

itemsets. But this approach avoids the costly generation of a large number of candidate sets and

repeated database scans, which is regarded as the most efficient strategy for mining frequent

itemsets. Finding of infrequent items gives the positive feed back to the Production Manager. In

this paper we are finding frequent and infrequent itemsets by taking opinions of different

customers by using Dissimilarity Matrix between frequent and infrequent items and also by

using Binary Variable technique. We also exclusively use AND Gate Logic function for finding

opinions of frequent and infrequent items.

Keywords: knowledge discovery, frequent items, infrequent items, similarity, dissimilarity.

AR-33 Developing a Middle Ware Architecture for Health Care

T. Sandhya, Faculty in Dept. of Computer Science, S. V. University, Tirupati.

Abstract: Hospitals depend on Data Warehousing techniques for keeping track of patient

information. The warehouse is meant to be a repository of historical patient data used to make

important treatment decisions for the patient. Secure and reliable storage of the data is needed for

quality patient care. But achieving this goal is not an easy task. Building a data warehouse can

be extremely expensive and once built, the systems can be complex to manage and maintain. In

an alternate arrangement that we have explored, middleware data hubs, allowing access to

patient information in various hubs can be used as an effective alternative. Instead of a central

repository of information, multiple hospitals can join together in this easily

scalable architecture to share data and function as a Virtual Data Warehouse(VDW). This

approach is faster and scalable but has the disadvantage of not being flexible and involves the

tedious work for converting existing databases to more or less compatible formats. In this paper,

we have discussed the benefits and risks involved in choosing to build a VDW.

Keywords: Data Warehouse, Virtual Data Warehouse, Middleware datahubs.

AR-34 A Survey on Implementation of Automated and Integrated

Data Sources in Key Word Based Web Information Retrieval

P. Sunil Kumar Reddy1 and K. Suneetha

2

1Research Scholar, Dept. of Comp. Science, S.V. University, Tirupathi. [email protected] 2Sr. Lecturer, Dept. of M.C.A, SVEC, Tirupathi. [email protected]

Abstract: Rapid growth in data integration result in automation of Experimental data that can be

revised interlinked and analyzed from different perspectives. From the users point of view

retrieving relevant information is a challenging task. In this survey, we present innovative

techniques for creating integrated views over data sources using keyword search techniques,

ranked answers, and user feedback to investigate how to automatically discover when a new data

source has content relevant to a user‟s view, performing automatic data integration for incoming

data sets which results in incorporating innumerous methods to discover related attributes,

including propagation algorithms from the machine learning community and existing schema

matchers. The user may provide feedback on the suggested new results, helping the system to

increase the cost of including a new source that is not relevant. In this survey, we discuss how

data sources can be adapted to more relevant information with global schema.

Keywords: Relevance feedback, user feedback, schema matching, schema alignment, keyword

search, data integration. Query system.

AR-36 Security Tracing Anonymity In Wireless Mesh Networks

M. B. Mukesh Krishnan1 and T. Balachander

2

1Assistant Professor, Department of Information Technology

SRM University, Chennai - 603 203. [email protected] 2Assistant Professor, Department of Computer Science and Engineering

SRM University, Chennai - 603 203. [email protected]

Abstract: Wireless Mesh Networks (WMN) is known for its low investment feature and

promising technology for both the client and the service providers. Nowadays almost all

connections are made through wireless networks, since it is cheap and less time consuming. As a

matter of fact, it also has its own limiting criteria. It faces issues like anonymous activities in a

network domain, spoofing attack, eavesdropping etc. Out of these issues, tracing down the

anonymous activities in a wireless network is a challenging task, which is in turn is our major

concern. Eradicating anonymity in a single step is not possible, hence in order to limit it to a

certain extent, a secured architecture tracing anonymity has been proposed. This architecture

makes use of the pseudonym generation technology to identify its authorized users. It also has a

ticketing system which makes use of the common network IP security protocols like

authentication and validation system to allot a defined session time for every authorized users

working inside the secured network. This is in turn will help in the process of limiting the

misbehavior rate in a wireless network. Also it will facilitate less storage on the database, since

only user activities alone are logged and not the errors encountered. The pseudonym that has

been generated for every user is known only to the server and it remains unknown to the client.

Keywords: Security, Wireless Mesh Network, Attacks, Architecture.

AR-37 Development of a Concordance for Sanskrit using Rule-based approach

V. Sethuram1, K. Samkeerthy

2 and Dr. R. J. Rama Sree

3

1Teaching Assistant, 2Technical Assistant, 3Professor, Dept. Computer Science

Rashtriya Sanskrit Vidyapeet, Tirupati.

Abstract: A concordance is a list of examples of a particular word, part of a word or

combination of words, in its contexts drawn from a text corpus. The search word is sometimes

also referred to as a keyword. The most common way of displaying a concordance is by a series

of lines of keyword in context (KWIC). KWIC is an acronym for Key Word In Context, the

most common format for concordance lines. A KWIC index is formed by sorting and aligning

the words within an article title to allow each word (except the stop words) in titles to be

searchable alphabetically in the index. It is a useful indexing method for technical manuals

before computerized full text search became common. Concordance software enables to

discover patterns that exist in natural language by grouping text in such a way that they are

clearly visible. The present work is concerned with the development of a concordance for

Sanskrit using Rule-based approach. The tool was well tested and the results are satisfactory.

Keywords: Concordance, Rule-Based Approach, KWIC.

AR-38 Stanford POS Tagger

G. Prasanna1, A. Vinaya simha

2 and Dr. R. J. Rama Sree

3

1Teaching Assistant, 2LDC, 3Professor, Dept. Computer Science Rashtriya Sanskrit Vidyapeet, Tirupati.

Abstract: Part-of-speech tagging (POS tagging or POST) is the process of marking up a word in

a text (corpus) as corresponding to a particular part of speech, based on both its definition, as

well as its context i.e. relationship with adjacent and related words in a phrase, sentence,

or paragraph. Classical parts of speech are noun and verb, and a few others, but nowadays Part of

Speech tag sets sub-divide these general word classes into smaller ones, such as proper names,

singular nouns, mass nouns and plural nouns. Part of Speech tag sets typically contain from a

little over twenty to more than a few hundred of different word classes. PoS tagging is a non-

trivial task because most words are ambiguous. They can belong to more than one class the

actual class depends on the context of use. The present work is concerned with the

implementation of Sanskrit language. The implementation is concerned with training of Sanskrit

annotated text and to test the new texts for assigning suitable tags to each of the text. The results

are satisfactory and outputs verification indicates that the annotated text is reliable.

Keywords: POST, Sanskrit POS tagger, PoS tagging.

AR-39 Clogging Control by Using Congestion Free Routers

Thodeti Srikanth, Research Scholar, Ph.D. (Computer Science), C.M.J.University

Meghalaya , INDIA. [email protected]

Abstract: The Internet‟s excellent scalability and robustness result in part from the end-to-end

nature of Internet congestion control. End-to-end congestion control algorithms alone, however,

are unable to prevent the clogging collapse and unfairness created by applications that are

unresponsive to network congestion. To address these maladies, we propose and investigate a

novel congestion-avoidance mechanism called Congestion Free Router (CFR). CFR entails the

exchange of feedback between routers at the borders of a network in order to detect and restrict

unresponsive traffic flows before they enter the network, thereby preventing clogging within the

network.

Keywords: CFR, TCP, UDP, ECSFQ

AR-40 Study on Dimensionality Reduction Techniques and Applications

G. N. Ramadevi1 and K. Usha Rani

2

1Research Scholar, 2Associate Professor, Department of Computer Science, SPMVV, Tirupati.

Abstract: Data is not collected only for data mining. Data accumulates in an unprecedented

speed. Data preprocessing is an important part for effective machine learning and data mining.

Data mining is discovering interesting knowledge from large amounts of data, which is the

integral part of the KDD, which is the overall process of converting raw data into useful

information. Dimension reduction can be beneficial not only for reason of computational

efficiency but also because it can improve the accuracy of the analysis. The set of techniques that

can be employed for dimension education can be partitioned in two important ways: they can be

separated into techniques that apply to supervised or unsupervised learning and into techniques

that either entail feature selection or feature extraction. In this paper on overview of dimension

reduction techniques based on this organization is presented and respective techniques in each

category is described.PCA is to reduce the dimensionality of the dataset without losing the data.

PCA is applied before clustering the data and the result of the clustering using PCA is more

accurate and time taken to reduce the data is substantially reduced.

Keywords: Dimensionality Reduction, Feature selection, Feature Extraction, PCA, PC and EM

clustering.

AR-41 Ad Hoc Routing for Bluetooth Using Epidemic Algorithm

A. Sai Suneel, Lecturer, Department of ECE, School of Engineering and Technology

SPMVV, [email protected]

Abstract: In an ad hoc network connection establishment is done to secure a path for routing

packets from source to destination. This path is then maintained to secure further transmissions.

In the case of Wireless Personal Area Networks (WPAN) which are more flexible, this is not

usable. Some constraints in Bluetooth demand a more flexible on-demand ad hoc network

compared to other types of ad hoc network protocols. Initially found that creating a scatternet is

not practically possible using Bluetooth version 1.1 as the slave/slave bridge is not implemented

into the hardware. In this paper, we present an Epidemic Algorithm to make it better suited for

Bluetooth routing. Distributing information within networks can be complicated if hosts have

only limited knowledge of the properties of the network. This leads to problems when it is highly

important that specific information has to reach one particular host or all hosts within the entire

network. Epidemic algorithms follow the paradigm of nature by applying simple rules to spread

information by just having a local view of the environment. According to this fact, these

algorithms are easy to implement and guarantee message propagation in heterogeneous and not

all the time coherent environments.

Keywords: Epidemic Algorithm, Bluetooth routing, Wireless Personal Area Network.

AR-42 Resolving Application Development Issues using SOA

Y. Kiran Kumar, G. Sujatha and G. Jagadeesh Kumar

Asst Professors, Dept of MCA, SVEC, A. Rangampet. [email protected], 9885631327 [email protected], 9989277158, [email protected], 9618261060

Abstract: SOA is an architectural style for building software applications that use services

available in a network such as the web. Distributed service-oriented architectures allow system

architects to create a distributed environment in which any number of applications, regardless of

geographical location, can interoperate seamlessly in a platform and language neutral manner.

Service-oriented architecture (SOA) is a set of principles for designing extensible, federated and

interoperable services, and it represents a new evolutional spiral in the program-applications

development and in the evolution of the information systems concept. Development, evolution

and maintenance of SOA-based systems demands rethinking of the traditional roles for

performing these activities. The key objective of this paper is to present preliminary ideas on the

roles required for developing, evolving and maintaining SOA-based systems.

Keywords: Service Oriented Architecture, Distributed services, Web Services, Modular

Programming, Web Applications, Software as a Service.

AR-43 Analyzing the Detection of Active Attacks in MANETs

P. Nirupama1 and G. M. Padmaja

2

1Associate Professor & HOD, CSE Dept, SIET. [email protected] 2Senior Assistant Professor, CSE Dept, BVRIT. [email protected]

Abstract: In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad

hoc network applications are deployed, security emerges as a central requirement. A

particularly devastating attack is known as the active attack, where two or more malicious

collision nodes create a higher level virtual tunnel in the network, which is employed to

transport packets between the tunnel end points. These tunnels emulate shorter links in

the network. In which adversary records transmitted packets at one location in the network,

tunnels them to another location, and retransmits them into the network. An Active

attack is possible even if the attacker has not compromised any hosts and even if all

communication provides authenticity and confidentiality. In this paper, we analyze ac t ive

attack nature in mobile ad hoc and sensor networks and existing methods to detect active

attacks without require any specialized hardware. This method provides an ability in

establishing a way to reduce the rate of refresh time and the response time to become

more faster.

Keywords: Mobile ad hoc network, Sensor network, active attack.

AR-44 Modeling an Expert System for Diagnosis of Gestational Diabetes

Mellitus Based on Risk factors

K. Vijaya Lakshmi1, E. Sreedevi

2 and Prof. M. Padmavathamma

3

Department of Computer Science, S.V. University, Tirupati.

[email protected] , [email protected], [email protected]

Abstract: Diabetes is a chronic illness that requires continuous medical care in patient self

management education to prevent acute complications. Gestational diabetes mellitus (GDM) is

present in around 3-4% of all pregnancies. This paper proposes a methodology to identify the

GDM in pregnant women. As many researchers contributed their work in diagnosing the diabetes

mellitus. Our proposed work focuses on modeling an expert system to diagnose GDM using

Feedforward Neural Network architecture.

Keywords: Diabetes, GDM, OGTT, Expert systems, Feedforward Neural Network.

AR-45 Binary Tree Structure Approach Based Digital Watermarking

S. B. Sridevi, Lecturer, Department of ECE, School of Engineering and Technology, SPMVV, Tirupati.

[email protected]

Abstract: A watermarking technique embeds information into a image with virtually

imperceptible modification of the image. In this, we propose a new lossless data hiding method

where distortion occurs due to data embedded can be completely removed from the watermarked

image after the watermark has been extracted and an binary tree structure approach to solve

the problem of communicating pairs of peak points in histogram is used. Distribution of pixel

differences is used to achieve large hiding capacity while keeping the distortion low. We adopt

a histogram shifting technique to prevent overflow and underflow. Performance comparison

with other existing schemes are provided to demonstrate the superiority of the proposed scheme.

Keywords: Image authentication, Histogram modification, Reversible Data Hiding. AR-46 Mobility scenario-based Performance Evaluation of Preemptive

DSR Protocol for MANET

K. Sangeetha Supriya1 and Y. Mohana Roopa2

1Asst.Professor, 2Associate Professor & HOD, Dept. of CSE, Annamacharya Institute of Tech. & Sci., Tirupati.

[email protected], [email protected]

Abstract: Ad hoc wireless networks are characterized by multi-hop wireless connectivity,

infrastructure less environment and frequently changing topology. To analyze the performance of

routing protocols in MANETs in the real world, a scenario based simulation analysis is required

since there is a lack of necessary infrastructure for their deployment. Most of the earlier work

done in this field have assumed the Random Waypoint model, which fails to capture the realistic

movement of the nodes. In this paper, we describe a set of experiments conducted to analyze the

performance of the Preemptive DSR routing protocol in a battlefield scenario. BonnMotion

Software(Java based) is used to create and analyses mobility scenarios. Initially an explanation

of the experimental metrics and the setup is described, followed by the scenarios used for our

simulations. The results give an idea of how the Preemptive DSR protocol behaves in the given

scenario and helps identify the metrics for optimal performance of the protocol.

Keywords: MANET, PDSR, battlefield scenario, Packet Delivery Ratio, delay.

AR-47 Multimodal Biometrics – An Overview

V. Sireesha1 and Dr. K. Sandhya Rani

2

1Research Scholar, 2Professor, Dept of Computer Science, SPMVV, Tirupati. [email protected], [email protected]

Abstract: Confidentiality is very important for every organization. Now a days, Biometric

technologies have became a foundation for identification and personal verification. Biometric

refers to technologies that measure and analyze the physiological characteristics of a human

body for verification or identification. Most Biometrics are unimodal, which rely on single

source of information for authentication. But these systems are facing variety of problems such

as Noise in sensed data, Non-universality, Spoof attacks, Distinctiveness. To overcome these

drawbacks a new research area multimodal biometrics is emerged. Multimodal biometric

systems consist of combining two or more biometric modalities in a single identification system.

As multimodal biometric systems depend on multiple sources of information, these are

categorized into six classes like Multi sensor systems, Multi algorithm systems, Multi instance

systems, Multi sample systems, Multi modal systems and Hybrid systems. In this paper, an

overview of multimodal biometrics and various fusion mechanisms are discussed.

Keywords: Biometrics, Unimodal, Multimodal, Fusion.

AR-48 A Privacy Preserving Clustering Method Based on Fuzzy

Approach and Random Rotation Perturbation

M. Naga lakshmi1 and Dr. K. Sandhya Rani

2

1Research Scholar, 2Professor, Dept of Computer Science, SPMVV, Tirupati. [email protected], [email protected]

Abstract: Individual privacy issues arise in these days when organizations are using clustering as

a data analysis tool. Private and sensitive data available in criminal, healthcare and financial

records need to be preserved and also avoid the privacy leakage with the data mining system. In

this paper, a privacy preserving clustering method is proposed for protecting the underlying

sensitive attribute values when sharing the data for clustering over centralized data. The

proposed method is based on the concept of fuzzy logic and random rotation perturbation. This

approach ensures secrecy of confidential numerical attributes without losing accuracy in

clustering results. The experiments demonstrate that the proposed method is effective and

provides a feasible approach to balance privacy and accuracy.

Keywords: Privacy preserving clustering, Fuzzy membership function, Data Perturbation, Data

Mining.

AR-49 A Survey on various Pattern recognition methods for the

Identification of a different types of Images

Ms. V. Sucharita1

and Dr. S. Jyothi2

1Research Scholar, 2Professor, Dept. of Computer Science, SPMVV, Tirupati.

[email protected], [email protected]

Abstract: The main aim of this paper is to discuss and compare some aspect of pattern

recognition, and identify research topics and applications which are at the forefront of this

exciting and challenging field. The primary goal of pattern recognition is supervised or

unsupervised classification. More recently, neural network techniques and methods imported

from statistical learning theory have been receiving increasing attention. The design of a

recognition system requires careful attention to the following issues: definition of pattern classes,

sensing environment, pattern representation, feature extraction and selection, classifier design

and learning, selection of training and test samples and performance evaluation. In the area of

research and development in this field, the general problem of recognizing complex patterns with

arbitrary orientation, location, and scale remains unsolved. New and emerging applications, such

as data mining, web searching, retrieval of multimedia data, face recognition, and cursive

handwriting recognition, require robust and efficient pattern recognition techniques.

Keywords: pattern recognition, classification, feature extraction, neural networks.

AR-50 Secure Data Transfer Using Audio Steganography – A Survey

T. Anuradha1 and Dr. K. Usha Rani

2

1Head, Dept. of computer Science, J.K.C.College, Guntur. [email protected]

2Asso.Professor, Dept. of Computer Science, SPMVV, Tirupati. [email protected]

Abstract: Data security is becoming very important part of our life now-a-days. Data

transmission in public communication system is not secure because of interception and improper

manipulation by eavesdropper. So, the solution for this problem is Steganography, which is the

art and science of writing hidden messages in such a way that no one, apart from the sender and

intend recipient, suspects the existence of the message. Audio steganography is the scheme of

hiding the existence of secret information by concealing it into another medium such as audio

file. In this paper we mainly discuss different types of audio steganographic methods, advantages

and disadvantages.

Keywords: Steganography, Cryptography, Audio Steganography, Least Significant Bit, Data

Hiding.

AR-51 Quality of Service Aware Dynamic Web Service Composition

P. Rajasekar and C. M. T. Karthigeyan

Assistant Professors, SRM University, Chennai - 603 203, India

[email protected], [email protected]

Abstract: DWSC (Dynamic Web Services Composition) is growing rapidly now a days. DWSC is

more useful in all types of commercial departments with all facilities requirement based on

Dynamic Web Service providers. DWSC is more necessary for the research to the modern

generation. Through the research DWSC is more useful in acting rapidly and protecting in the field

of commerce and communication. BPEL (Business Process Execution Language) is very useful

for developing DWSC for all sorts of business super fast and sent percent safely without time delay

throughout a universal wide. So, BPEL is very useful in now a days. BPEL is to create, access and

to document automatically. Due to the research information and news formed by new framework

of Peer-to-Peer (P-to-P or P2P) environment using QoS (Quality of Services). BPEL can be

transferred any part of universal creation, access and documentation between the closed

communication so that the search and discovery of services. The framework P2P is cyber link

connected to all types Business solution automatically. The entire works is used for QoS enhanced

safety and security services. The QoS is used for similar services among the closed

communications so that the search and discovery of services are rapidly with safe and security.

AR-53 Analysis Of (2,2) Visual Cryptographic Scheme

M. Nirupama Bhat1 and Dr. K. Usha Rani

2

1Research Scholar, 2Associate Professor, Dept. of CS, Sri Padmavathi Mahila Visvavidyalayam, Tirupati.

[email protected], [email protected]

Abstract: Visual Cryptographic schemes are one of the secret sharing schemes where a secret in

the form of image is encoded into required number, n of shadow images called shares and

distributed among n participants. This secret can be revealed 'visually only when these shares are

stacked together one on the other. In secret sharing process is a very secured process as the

secret is highly maintained .Depending on the algorithm used, the storage, the resolution and the

contrast of the reconstructed image will be changed. This paper is a study of a (2,2) visual

cryptographic scheme and the analysis of secrecy, resolution and contrast in the original and

stacked image. Though the recover of the secret can be done without using cryptographic

techniques and complex algorithms, an effort is made to restore back the quality of the stacked

image. This will be useful when scanned documents are transmitted as shares and can be

recovered back conveniently.

Keywords: visual cryptography, pixel expansion, contrast, security.

AR-54 Contrast Stretching Enhancement Techniques for Acute Leukemia Images

V. Raja Rajeswari and N. Ramesh

Faculty, Dept of ECE, School of Engineering and Technology, SPMVV, Tirupati. [email protected], [email protected]

Abstract: Leukemia is a cancer of the blood cells. When people affected with Leukemia, the

bone marrow starts to generate a lot of abnormal white blood cells. They do not work like normal

white blood cells, grow faster than normal cells, this can lead to serious problems. Leukemia

affects people in any age either they are children or adults. The screening system guidlines the

leukemia patients to determine the abnormal levels of white blood cells. Therefore, medical

professionals use medical images to diagnose leukemia. However, sometimes results show false

diagnosis because of blurness and effect of unwanted noise on leukemia images. In such

situations, the image processing such as image enhancement techniques are needed to improve

the quality of leukemia images. This paper proposes several contrast stretching image

enhancement techniques such as bright, dark, global, local and partial methods. All these

enhancement techniques are applied on the ALL (Acute Lymphocyclic Leukemia) images and

AML (Acute Myelogenous Leukemia) images. Results are observed for several images and Peak

Signal to Noise Ratio (PSNR) is calculated. All the proposed image enhancement techniques are

carried to find out best technique for enhancing the Acute Leukemia images. Based on the

results, the partial contrast stretching method is considered as the best technique that helps to

improve quality of the image.

Keywords: Acute Lymphocyclic Leukemia, Acute Myelogenous Leukemia, PSNR, bright contrast

stretching, dark contrast stretching, global contrast stretching l, local contrast stretching and

partial contrast stretching.

AR-55 Removing an Unnecessary Barrier in the Composite Object Data Model

M. Ravi Prasad, HOD of MCA, Sri Sai College of IT & Mgmt, Kadapa. [email protected]

Abstract: OLAP and object data models represent different logical concepts and structures, and

therefore separate database systems with different query languages were developed based on

these models. We show in this paper that it is desirable and possible to combine these models to

represent realistic modeling requirements. We define in this paper an OLAP Object data model

that combines the main characteristics of OLAP and Object data models in order to represent

their functionalities in a common framework. We use three different types of object classes:

primitive, regular and composite. In the OLAP-Object data model, primitive and regular classes

which represent object structures can be used for form composite classes that represent OLAP

structures. We define a query language that uses path structures to facilitate data navigation and

data manipulation. The proposed language uses the concept of an anchor. An anchor is an object

class (primitive, regular or composite) that is selected as a starting node from which paths

structures can be formed to express queries. The power of the proposed query language is

illustrated through numerous examples. The syntax and semantics of the proposed language are

developed.

AR-56 Energy Efficient Zone Disjoint Shortest Multipath Routing Protocol

K. Muralidhar1 and Dr. N. Geethanjali

2

1Research Scholar, 2Associate Professor & Head, Dept. of Computer Science & Technology

Sri Krishnadevaraya University, Anantapur-515002.

Abstract: Energy in mobile adhoc networks is of much important. Similarly shortest path from

source to destination is also important for routing. Several routing protocols for MANETs have

been proposed. Most of the existing routing protocols are single routing path between source and

destination nodes. This results in rapid depletion of battery power of the nodes that comprise the

path between the source and destination nodes and on the other hand the devices in mobile ad-

hoc network have limited power. The proposed protocol overcomes these drawbacks by

following a hybrid approach to routing of data packets by establishing Energy efficient zone

disjoint shortest multipaths between the source and destination zones by avoiding paths with

nodes that have a shorter lifetime remaining, since the nodes‟ residual energy is important in

determining the path to successfully complete data transfer without interruption and also

avoiding paths with many hopes, which delays the delivery of packets. The proposed protocol is

based on the zone disjoint multipath routing protocol (ZMR). The packets are encrypted by using

a symmetric cryptosystem. As this is a multipath protocol, it shifts the route without further

overhead, delay and loss of packets. Simulation results shows that the proposed protocol

EEZDSM performs well compared to existing ZMR and provide a reliable, energy efficient and

effective approach for routing packets in MANETs.

Keywords: Energy Efficient, Non-overlapping zone, Zone based Hierarchial Link state routing

protocol, Zone disjoint routing protocols, Hybrid routing protocol, residual energy, shortest

multipath.

AR-57 Neuro-Fuzzy Systems and Applications – A Review

K. Vijaya Sri1 and Dr. K. Usha Rani

2

1Research Scholar, 2Associate Professor, Department of Computer Science, SPMVV, Tirupati. [email protected], [email protected]

Abstract: This paper presents an introduction to modelling the non-linear systems by using novel

methods of Soft Computing. It lists the principal variants of soft computing. One of the wide

areas of research related to hybrid systems in Soft Computing i.e., Neuro-Fuzzy method is

focused and its methodology is specified. Nuero-Fuzzy Systems are applied over various

domains and resulted with accurate results. A review on different methods and models used in

framing a Neuro-Fuzzy system with various applications are presented in this paper.

Keywords: Computational Intelligence, Soft Computing, Hybrid Systems, Neuro-Fuzzy Systems.

AR-58 Wireless Networks: A Comparison and Classification based on

Outlier Detection Methods

T. Kavitha1 and A. Chandra

2

1Department of Computer Science and Systems Engineering, SVEC, A. Rangampet, Tirupati.

[email protected], [email protected]

Abstract: Outlier detection has been used for centuries to detect and, where appropriate, remove

anomalous observations from data. Outliers arise due to mechanical faults, changes in system

behavior, fraudulent behavior, human error, instrument error or simply through natural

deviations in populations. Their detection can identify system faults and fraud before they

escalate with potentially catastrophic consequences. It can identify errors and remove their

contaminating effect on the data set and as such to purify the data for processing. The original

outlier detection methods were arbitrary but now, principled and systematic techniques are used,

drawn from the full gamut of Computer Science and Statistics. In the field of wireless sensor

networks, measurements that significantly deviate from the normal pattern of sensed data are

considered as outliers. The potential sources of outliers include noise and errors, events, and

malicious attacks on the network. Traditional outlier detection techniques are not directly

applicable to wireless sensor networks due to the multivariate nature of sensor data and specific

requirements and limitations of the wireless sensor networks. In this paper we provide a

comprehensive overview of existing outlier detection techniques specifically developed for the

wireless sensor networks. Additionally, it presents a technique-based taxonomy and a decision

tree to be used as a guideline to select a technique suitable for the application at hand based on

characteristics such as data type, outlier type and outlier degree.

AR-59 HONEY POTS: A New Mechanism for Network Security

A. Chandra and K. Lalitha

Department of Computer Science and Systems Engineering, SVEC, A. Rangampet, Tirupati

[email protected], [email protected]

Abstract: Honey pots allow us to turn the tables on the bad guys. A honeypot is used in the

area of computer and Internet security. It is a resource, which is intended to be attacked and

computerized to gain more information about the attacker, and used tools. One goal of this

paper is to show the possibilities of honeypots and their use in research as well as

productive environment. Compared to an intrusion detection system, honeypots have the

big advantage that they do not generate false alerts as each observed traffic is suspicious,

because no productive components are running in the system. So in this paper we discuss about

honeypots a method for providing network security and briefly about firewalls.

AR-60 Effective Implementation of Query Optimization Through

Performance Tuning Techniques on Web

P. Jyotsna1, P. Sunil Kumar Reddy

2 and Prof.P.Govindarajulu

3

1,2 Dept of Computer science,S.V.University, Tirupati.

[email protected], [email protected], [email protected]

Abstract: This study focuses on the advent of the Internet and the Web and to connect

information sources across all types of boundaries where information sources include databases,

XML documents, and other unstructured sources. This study highlights uniformly querying those

information sources and implementing Query Optimization techniques. Since the Information is

scattered in the Web, querying the sources forms the basis to improve efficiency to retrieve

information which can be done through Query Optimization. In this paper, we survey the current

research on fundamental problems to efficiently process queries over Web data integration

systems. Optimization techniques handle different dimensions of information like volatility,

heterogeneity and autonomy which form the case for information retrieval. This study outlines

framework for evaluating such information through Query optimization techniques.

Keywords: Query Optimization, Data Integration, OODBMS, Information retrieval, Database

Management Systems, Performance tuning, Object Query Language, Stack based approach,

Relational databases.

AR-61 A Novel Dynamic Route Selection Algorithm

for Secure Data Transmission

B. Muneendra Nayak1, Dr. V. Ragunatha Reddy

2 and Dr. E. Madhusudhana Reddy

3

1C.Lecturer, Dept of Engineering, SVPPPC(TTD), Tirupati. [email protected] 2Assistant Professor, Dept. of Computer Science, SKU, Anantapur. [email protected]

3Professor, Dept. of CSE, MITS, Madanapalle. [email protected]

Abstract: Security has become one of the major issues for data communication over wired and

wireless networks and also providing a two way shortest path routing in wireless networks.

Different from the past work on the designs of cryptography algorithms and system

infrastructures, we will propose a dynamic routing algorithm that could randomize delivery paths

for data transmission. In this paper, we propose two techniques that reduce the discretization

errors, which allow faster algorithms to be designed. Reducing the overhead of computing

constrained shortest paths is practically important for the successful design of a high-throughput

QoS router, which is limited at both processing power and memory space

Keywords: cryptography algorithms, constrained shortest paths, QoS routing.

AR-62 Reducing the Correcting Cost of Faulty Nodes in Externally

Managed Overlay Networks

V. L. Pavani1 and Dr. B. Sathyanarayana

2

1Assistant Professor, Department of MCA, Intell Engineering College, Anantapur. 2Professor, Department of Computer Science, S.K.University, Anantapur.

Abstract: An end-to-end approach of inferring probabilistic data forwarding failures is

considered in an externally managed overlay network. The overlay nodes are independently

operated by various administrative domains. The optimization goal is to minimize the expected

cost of correcting all faulty overlay nodes that cannot properly deliver data. The correcting cost

includes diagnosing and repairing. A candidate node should be first checked which is identified

using a potential function instead of first checking the most likely faulty nodes as in conventional

fault localization problems. Several efficient heuristics are proposed for inferring the best node to

be checked in large-scale network. It is shown by extensive simulation that the best node can be

inferred in at least 95 percent of time, and that first checking the candidate nodes rather than the

most likely faulty nodes can decrease the checking cost of correcting all faulty nodes. The

correct location of the candidate node that can be checked first is shown.

AR-64 A Hierarchical Pattern Matching Algorithm by Using Intrusion

Detection System

E. Gayathri1 and Dr. N. Geethanjali

2

1Assistant Professor, Department of MCA, Intell Engineering College, Anantapur. 2HOD, Department of Computer Science, S.K .University, Anantapur.

Abstract: Detection engines capable of inspecting packet payloads for application-layer network

information are urgently required. The most important technology for fast payload inspection is

an efficient multi pattern matching algorithm, which performs exact string matching between

packets and a large set of predefined patterns. This paper proposes a novel Enhanced

Hierarchical Multi pattern Matching Algorithm (EHMA) for packet inspection. Based on the

occurrence frequency of grams, a small set of the most frequent grams is discovered and used in

the EHMA. EHMA is a two-tier and cluster-wise matching algorithm, which significantly

reduces the amount of external memory accesses and the capacity of memory. Using a skippable

scan strategy, EHMA speeds up the scanning process. Furthermore, independent of parallel and

special functions, EHMA is very simple and therefore practical for both software and hardware

implementations. Simulation results reveal that EHMA significantly improves the matching

performance. The speed of EHMA is about 0.89-1,161 times faster than that of current matching

algorithms. Even under real-life intense attack, EHMA still performs well.

AR-65 Data Transformation Services

P. S. Sailaja Lecturer, Dept. of Computer Science, SPW Degree & PG College, Tirupati.

Abstract: In recent years, databases have become an important area of information processing,

and it is easy to foresee that their importance will rapidly grow. Databases and database systems

have become an essential component of everyday life in modern society. A database may be

generated and maintained manually or it may be computerized .A computerized database may be

created and maintained either by a group of application programs written specifically for that

task or by a database management. A database management system is a collection of programs

that enables users to create and maintain a database. It is general purpose software system that

facilities the processes of defining, constructing and manipulating databases for various

applications. Nowadays, database management system is used in different types of applications

such as managing records of organizations, industries, schools, institutes and shops. There

applications are offline applications. However it also provides data to online applications. These

online applications are software which is totally dependent on the internet and networking

features. The paper mainly deals with Data Transformation Services is a very powerful yet easy

to use data movement facility that can transfer data. It enables data movement between data

sources. Data Transformation Service is an innovative data base migration product that easily

converts data from one database to another. Manually converting data from one database to

another is risky and it takes long period of time. By using Data Transformation Services, we

convert the tables from one databases to another with less time, more accuracy and error free.

AR-66 Data on The Road in Intelligent Transportation Systems

Kumbham Bhargavi and Dr. S. Jyothi Research Scholar, Professor, Dept. of Computer Science, SPMVV, Tirupati.

Abstract: Advances in wireless technology and mobile computing have provided a major

impetus towards development of mobile Ad-hoc Network. This networks are self organizing

networks comprised of wireless nodes that co– operate in order to dynamically establish

communication. In this paper we Propose an opportunistic approach to resource (parking slot,

taxi-cab customer, etc.) dissemination, in which an object propagates the resources it carries to

encountered objects, and obtains new resources in exchange. For example, an object finds out

about available parking spaces from other objects. These spaces may either have been vacated by

these encountered objects or these objects have obtained this information from other previously

encountered ones. Thus the parking space information transitively spreads out across objects

.Similarly, information about an accident or a taxi cab customer is propagated transitively. The

approach can also be used in dissemination of resources among pedestrians. The target of the

design is to connect different moving devices together, wirelessly in an small geographical Area.

AR-67 Augmented Reality Based Approach In Educational Field Using AR Books

D. Abhishekh1, B. Ramakantha Reddy

2 and R. Raja Kumar

3

1,2Assistant Professor, Dept. of CSE, SV College of Engineering, Tirupati.

3Assistant Professor, Dept. of CSE, SV College of Engineering for women, Tirupati.

[email protected], [email protected], [email protected]

Abstract: Technological advances enable the use of innovative tools in education. Augmented

reality in education enables interactive way of learning in field of education. Augmented reality

(AR) is a technology which combines real world with virtual object in a real 3D. AR made it

evolution from virtual reality. A virtual object is augmented into the real world and it interacts

with the real world. It is a form of experience where a computer generated virtual object is

enhanced in real world. Recent developments in augmented reality explores its impact on society

and in education which made a new way of stimulating learning with a computer generated

models enhanced in real world and with its animation support explaining tough concepts in easy

way which gives an attention-grabbing learning platform for students. This paper mainly focus

on generation of AR books which made the learning environment exciting with this new level of

technology.

Keywords: Augmented reality, virtual reality, education, 3D, AR books.

AR-68 Relevance Feedback for Content Based Image Retrieval

Based on Multitext on Histogram and Microstructure Descriptor

Kranthi Kumar. K1, Dr. T. Venu Gopal

2 and M. Rama Krishna

3

1Assistant Professor, Department of IT, SNIST, Yamnampet, Ghatkesar, Hyderabad.

[email protected] 2Associate Professor, Department of CSE, JNTUH College of Engineering, Kondagattu, Karimnagar.

[email protected] 3Assistant Professor, Department of CSE, SNIST, Yamnampet, Ghatkesar, Hyderabad.

[email protected]

Abstract: Image retrieval is an important topic in the field of pattern recognition and artificial

intelligence. There are three categories of image retrieval methods: text-based, content-based and

semantic-based. In CBIR, images are indexed by their visual content, such as color, texture,

shapes. A new image feature detector and descriptor, namely the micro-structure

descriptor(MSD) is discussed to describe image features via micro-structures. The micro-

structure is defined based on the edge orientation similarity, and the MSD is built based on the

underlying colors in micro-structures with similar edge orientation. Content-based image

retrieval (CBIR) is the mainstay of image retrieval systems. To be more profitable relevance

feedback techniques are incorporated into CBIR such that more precise results can be obtained

by taking user‟s feedbacks into account. The semantic gap between low-level features and high-

level concepts handled by the user is one of the main problems in image retrieval. On the other

hand, the relevance feedback has been used on many CBIR systems such as an effective solution

to reduce the semantic gap. The gap is reduced by using the Multitexton Histogram descriptor. In

this paper, a novel framework method called Relevance Feedback is used to achieve high

efficiency and effectiveness of CBIR in coping with the large-scale image data. For that reason

this paper proposes a method of relevance feedback based on Multitexton Histogram descriptor

to represents the effective feature representations, and the Microstructure descriptor (MSD) for

efficient feature extraction of an image. By using this method, high quality of image retrieval on

Relevance Feedback can be achieved in a small number of feedbacks. In terms of efficiency,

iteration of feedback is reduced substantially by using the navigation patterns discovered from

the user query log, which reduce the computational processing time.

Keywords: CBIR, Relevance Feedback, Semantic Gap, Microstructure descriptor (MSD),

Multitexton Histogram descriptor.

AR-69 Information Technology Related Innovations in Every Business Function

K. Divya Faculty, Dept. of Communication and Journalism, SPMVV, Tirupati. [email protected]

Abstract: Information Technology (IT) is now being viewed as an organizational core

competency that is necessary for organizations to survive in this competitive world. IT

applications have enabled organizations across the world to work in an effective and efficient

manner. IT applications have changed the nature of the work place. From multi-national

corporations who maintain mainframe systems and databases to small businesses that own a

single computer, IT plays a major role. The primary reason for the increase in popularity and

utilization of Information Technology, especially in business is for its efficiency, speed, low

procurement cost and accuracy in handling of multiples tasks simultaneously. Several

Departments in business organizations such as Human Resources, manufacturing, Customer

service, sales and marketing utilize IT to carry out their respective operations in a productive

manner. It facilitates the information flow between the customers, manufacturing operations and

suppliers that certainly plays a key role in improving the efficiency and responsiveness to meet

the customer requirements. Software is an important part of IT which relates to computer

applications that enable a company to generate, store, program and retrieve data. Today there are

many software programmes are assigned in all the operations of business sectors for executing

specific task. Enterprise Resource Planning (ERP), Computer Aided Design (CAD), Electronic

Data Interchange (EDI), Point- of- sale (POS), IVRs (Interactive Voice Response)and Electronic

Commerce are some examples of different software‟s used in business. Today, if a company is

not utilising Information Technology properly means they are at risk. It can be said that IT

provides a huge range of capabilities that enhance management performance at all levels in order

to gain more profits.

Keywords: Information Technology (IT), Enterprise Resource Planning (ERP), Computer Aided Design

(CAD), Electronic Data Interchange (EDI), Point- of- sale (POS), IVRs (Interactive Voice Response) and Electronic Commerce.

AR-70 Duplicate Detection of Query results from Multiple Web Databases

G. Bala Krishna Priya, M.Sc.(Comp.Sci.), M.Phil., SPWD & PG College, Tirupati.

Abstract: Record matching, which identifies the records that represent the same real-world

entity, is an important step for data integration. Most state-of-the-art record matching methods

are supervised, which requires the user to provide training data. These methods are not

applicable for the web database scenario, where the records to match are query results

dynamically generated on-the-fly. Such records are query-dependent and a prelearned method

using training examples from previous query results may fail on the results of a new query. To

address the problem of record matching in the web databases scenario, we present an

Unsupervised, online duplicate detection method UDD, which, for a given query, can effectively

identify duplicates from the query result records of multiple web databases. After removal of the

same-source duplicates, the “presumed” nonduplicate records from the same source can be used

as training examples alleviating the burden of users having to manually label training examples.

Starting from the nonduplicate set, we use two cooperating classifiers, a weighted component

similarity summing classifier and SVM classifier, to iteratively identify duplicates in the query

results from web databases. Experimental results show that UDD works well for the web

database scenario where existing supervised methods do not apply.

AR-71 A Cloud Frame Work for Monitoring People Health

R. Nagarjuna Reddy, M.Tech., JNTUA. [email protected].

L. Narasimha Sai Kiran, M.Tech. and G. S. Prasada Reddy, M.Tech.(SE)

Abstract: There's something big happening in the healthcare industry, and it seems there is a

silver lining to this cloud. Studies say that security, regulatory and privacy concerns might get in

the way of cloud computing in the healthcare industry, although this sector is set to grow in the

medium term. Modernization in the healthcare system is going beyond Electronic Healthcare

Records (EHR). According to research firm Markets and Markets, the use of cloud computing in

healthcare will span both clinical and non-clinical applications. Apart from EHR, cloud

computing will also apply to other clinical uses, such as physician order entry and software

imaging and pharmacy use. Non-clinical uses will likewise benefit, including management apps

for patient billing, claims and revenue cycle management. According to MarketsandMarkets, the

use of cloud computing in healthcare will be greatly beneficial in sharing EHR data across

facilities in different geographic locations. Using cloud applications will ensure that patients get

treated on time, regardless of location and facility. We can use cloud services in following

scenario.

Keywords: health guides, health outreach, personal health systems, personal profile.

AR-72 A Parameterized Runtime Analysis of evolutionary Algorithm for Minimization in Euclidean TSP

G. Nagalakshmi1 and Dr. S. Jyothi

2

1Associate Professor & HOD, CSE&IT Dept., Siddhartha Institute of Science and Technology,

Puttur. 2Professor, Dept. of Computer Science, SPMVV (Women‟s University), Tirupathi.

Abstract: Although evolutionary algorithms (EAs) are widely used in practical optimization,

their theoretical analysis is still in its infancy. Up to now results on the (expected) runtime are

limited to discrete search spaces, yet EAs are mostly applied to continuous optimization

problems. So far results on the runtime of EAs for continuous search spaces rely on validation by

experiments/simulations since merely a simplifying model of the respective stochastic process is

investigated. We exploit structural properties related to the optimization process of evolutionary

algorithms for this problem and use them to bound the runtime in dependence of the number of

inner points k and shows the simple evolutionary algorithms solve the Euclidean TSP in

expected time O(n4k

(2k-1)!). Moreover, we show that, under reasonable geometric constraints, a

locally optimal 2-opt tour can be found by randomized local search in expected time O(n2k

k!).

AR-73

Comparative Study of Different Approaches of Spectral Clustering on Graphs

G. Sujatha1 and Dr K. Usha Rani

2

1Assistanat Professor, Department of MCA, Rao & Naidu Engineering College. 2Associate Professor, SPMVV, Department of Computer Science, Tirupathi.

[email protected], 2 [email protected]

Abstract: In recent years, spectral clustering algorithms have been more effective in finding

clusters than other traditional algorithms. It is simple to implement and produce high quality

clustering on small data set. The goal of this paper is to give brief idea about the different

approaches of spectral clustering on graphs.

Keywords: Spectral clustering, Graph notation, Incremental spectral clustering.

AR-74 Image Denoising Using Fusion Based Curvelts and Wavelets Transform

P. Subba Lakshmi and S. Fairoz Sulthana Faculty, Dept. of ECE, School of Engg. and Tech., SPMVV, Tirupati.

Abstract: A medical image consists of random noise which is affected during acquisition and it

spread over the image. In such situations it is very difficult to diagnose the particular disease. To

achieve the best possible diagnosis it is important that medical images must be sharp, clear and

free of noise. For this purpose, several denoising methods are developed both in spatial and

frequency domains to remove noise from digital images. Wavelets transform and curvelets

transforms are widely used methods for denoising images in frequency domain. But, wavelets

transform fail to represent efficiently singularities along the lines or curves which fail to explore

geometrical singularity of edges in images and curvelet transform method has also brought some

scratches and ringing phenomenon in the reconstructed image. In this proposed work, fusion

based curvelets and wavelets transformation methods are used to obtain the high quality images.

Results are observed for several noisy images and PSNR is calculated. From the experimental

results, this proposed fusion based curvelet and wavelet transform algorithm is well suitable for

medical images.

Keywords: Noise, Curvlet transform, Wavelet transform, Fusion, PSNR.

AR-78 A Crypto Virology: A Deadly Combination

S. Heera, P. Vaishnavi and S. Surekha

Sri Padmavathi Mahila Visvavidyalayam, Tirupati.

[email protected], [email protected]

Abstract: Understanding the possible extent of the future attacks is the key to successfully

protecting against them. Designers of protection mechanisms need to keep in mind the potential

ferocity and sophistication of viruses that are just around the corner. That is why we think that

the potential destructive capabilities of fast spreading worms like the Warhol worm, Flash worm

and Curious Yellow need to be explored to the maximum extent possible. While re-visiting some

techniques of viruses from the past, we can come across some that utilize cryptographic tools in

their malicious activity. That alarming property, combined with the speed of the so-called “super

worms”, is explored in the present work. Suggestions for countermeasures and future work are

given.

Keywords: Computer viruses, worms, cryptography, crypto virology

AR-79 Design of Low Voltage Switched Op-amp with

rail-to-rail to input common mode range

N. Kusuma1 and P. Hemachandu

2

Lecturer, SPMVV, Dept. of E&C Engineering, M.Tech-VLSI System Design (NIT-Warangal).

[email protected]

(Ph.d- Power Systems, S.V.University- tirupathi), Dept. of E&E Engineering. [email protected]

Abstract: With the demand of low power wireless communication applications, running circuits

with reduced supply voltage can be of great advantage. Switched capacitor circuit is well known

for their high linearity even with voltage supply variation since the capacitor value is only

dependent on the process. However, when running the switched capacitor circuit with a reduced

voltage supply, problems with the switches arise as they cease to function within a portion of the

operating voltage range. A technique called switched OpAmp is proposed as a solution. The

problematic switches are replaced with OpAmps that are capable of switching ON and OFF to

mimic the operation of the switches. This method is proven to be feasible along with some power

savings since the OpAmp is in operation for only half of the clock cycle. But much less attention

has been paid to input common mode(CM) range while working on low voltage. The input

voltage applied must fall in input CM range for proper amplification. This paper presents a

switched capacitor based attenuator (SCBA) network to extend the input CM to rail to rail for

switched opamp which is meant for working in low voltage. Modern wireless communication

systems employ various kinds of standards that can be classified in many ways. Switched

OpAmp is designed in 0.18um CMOS Process Technology.

Keywords: Low voltage, active region, forbidden region, common mode, rail to rail, threshold

voltage.

AR-80 An Improved K-means Clustering Algorithm with refined

initial Centroids

G. Pradeepini1 and Prof. S. Jyothi

2

1Associate Professor, Department of Master of Computer Applications

Rao & Naidu Engineering College, Ongole. [email protected] 2 Professor, Department of Computer Science, SPMVV, [email protected]

Abstract: A final Clustering result of the k-means clustering algorithm greatly depends upon

the correctness of the initial centroids. Generally the initial centroids for the k-means clustering

are chosen randomly so that the selected initial centroids may converges to numerous local

minima, not the global optimum. In this paper a new initialization approach to find initial

centroids for k-means clustering is proposed. According to our experimental results, the

Improved k-means Clustering Algorithm has the more accuracy with less computational time

comparatively Original k-means clustering algorithm.

Keywords: Clustering, Data Mining, Data partitioning, Initial centroids, K-means algorithm. Cluster

analysis, Data analysis.

AR-82 A Study of Semantic Web for E-Business and E-Laerning

J. Murali, Asst.Professor, SVEC, A.Rangampet, Tirupati.

Abstract: The Semantic Web Research has resulted in the last years in significant outcomes.

This Semantic Web will provide intelligent access to heterogeneous, distributed information,

enabling software products (agents) to mediate between user needs and the information sources

available. In this paper we describe some areas for application of this new technology. We focus

on ongoing work in the fields of “E-business” and “E-Learning”.

Keywords: Semantic Web, Ontologies, E-Business, and E-Learning.

AR-83 Prediction and Classification of Speech in Speech Recognition System

N. Usha Rani, Assistant Professor, Department of CSE, SVUCE,

Sri Venkateswara University, Tirupathi. [email protected]

Abstract: Speech Recognition is one of the important application areas of Artificial Intelligence.

Speech recognition is the process of converting the acoustic signals into corresponding text

transcription. Achievement of the high speech recognition accuracy is the critical factor. It is

very complex task to identify the speech spoken in different rates. Duration of the speech is one

of the most important features used to identify the speech at particular rate. The present work

focuses on the prediction of the speech using duration parameter and classifies them in to slow,

normal and fast.

Keywords: Speech Recognition, Sphinx, Hidden Markov Model (HMM), prediction and

Classification method.

AR-84 A Novel Approach for Clustering Web Services and

Rest Services Using WSDL

N. P. Shangaranarayanee1, Dr. T. Rajendran

2 and Mr. P. Krishna Sankar

3

1PG Scholar, Department of CSE, Angel College of Engineering &Technology, Tirupur-641 665, Tamilnadu.

[email protected]. 2Professor and Dean, Department of Computer Science and Engineering and Information Technology, Angel

College of Engineering &Technology, Tirupur-641 665, Tamilnadu. [email protected]. 3Assistant Professor, Department of Computer science and Engineering, Dr.Mahalingam College of

Engineering&Technology, Pollachi-642 003, Tamilnadu. [email protected].

Abstract: Today‟s life style with increasing use of web for there everyday tasks is making

service providing is an essential part for Internet customer‟s. Web services help organizations

maintain an operative presence on Internet. Service-oriented architecture (SOA) and its flagship

implementation technology known as Web services have changed way software engineers design

and develop enterprise applications. Clustering the services would greatly boost ability of web

service search engine to retrieve relevant ones with most relevant Web services. From novel

approach to new one called REST services. REST is to identify an architectural style based on a

set of principles for designing network-based software architectures. The term was extended to

describe a style of building web services based on the principles of REST. In our approach to

cluster REST services based on function and by addressability along with some form of

connectedness are embedded in WSDL definition of bindings and ports.

Keywords: REST, HTTP, RPC, HTML, SOAP, WSDL, URI, XML, W3C.

AR-85 Attacks and Challenges in Wireless Mesh Networks

K. Venkata Ravi, Research Scholar. [email protected]

P. Nageswararao, Head of CSE, SITS. [email protected] and Dr. Sanjay Kumar, Head of CSE,

Ravi Shankar Shukla University.

Abstract: IEEE 802.11s WMN is a new wireless networking technology. This is a low –cost,

multi hop wireless broadband provisioning technology. One main challenge in design of this

network is the vulnerability to security attacks. IEEE 802.11smesh router deployed in shopping

malls, university campuses, airport & other such type of locations to provide high speed Internet

to users. The WMN is vulnerable to Denial-of-Service[DoS] attacks due to the vast coverage

area and dense deployment of wireless mesh routers. DoS is the most server security threat. As

DoS can compromise the availability & integrity of the service. In this paper we identify the DoS

attacks in wireless mesh network along with possible defenses and future directions.

Keywords: Broadband networks, wireless networks, IEEE802.11s, Denial of service, Internet

Gateway.

AR-86 Data Preprocessing for efficient External Sorting

S. Hrushikesava Raju1 and Dr. T. Swarna Latha

2

1Associate Professor, Dept. of CSE, SIETK, Puttur. 2Professor, Dept. of CSE, St.Anns Engineering college, Chirala.

[email protected], [email protected]

Abstract: This paper presents external sorting using data preprocessing. Generally, huge data of

any organization possess data redundancy, noise and data inconsistency. To eliminate, Data

preprocessing should be performed on raw data, then sorting technique is applied on it. Data

preprocessing includes many methods such as data cleaning, data integration, data

transformation and data reduction. Depending on the complexity of given data, these methods

are taken and applied on raw data in order to produce quality of data. Then, external sorting is

applied. The external sorting now takes the number of passes less than actual passes log B (N/M)

+ 1 for B – way external merge sorting, and number of Input / Outputs less than 2*N* (log B

(N/M) + 1) of Input / Outputs and also involve least number of runs compared to actual basic

external sorting.

Keywords: data preprocessing, external sorting, Data Cleaning, passes, Inputs / Outputs, and

runs.

AR-91 Magnetic Resource Force Microscopy for Reconstruction of H-B

Sparse Fingerprint Image

Josphineleela. R1 and M. Ramakrishnan

2

1Research scholar, Sathyabama University, Chennai. [email protected] 2Department of Information Technology, Velammal Engineering College, Chennai

[email protected]

Abstract: Magnetic Resource Force Microscopy for Reconstruction of H-B Sparse Fingerprint

Image presents a Hierarchical Bayesian model to reconstruct sparse images when the

observations are obtained from linear transformations and corrupted by an additive white

Gaussian noise. Our hierarchical Bayes model is well suited to such naturally sparse fingerprint

image applications as it seamlessly accounts for properties such as sparsity and positivity of the

fingerprint image via appropriate Bayes priors. We propose a prior that is based on a weighted

mixture of a positive exponential distribution and a mass at zero. The prior has hyper parameters

that are tuned automatically by marginalization over the hierarchical Bayesian model. To

overcome the complexity of the posterior distribution, a Gibbs sampling strategy is proposed.

The Gibbs samples can be used to estimate the image to be recovered, e.g. by maximizing the

estimated posterior distribution. In our fully Bayesian approach the posteriors of all the

parameters are available. Gibbs algorithm provides more information than other previously

proposed sparse reconstruction methods that only give a point estimate. The performance of our

hierarchical Bayesian sparse reconstruction method is illustrated on synthetic and real data

collected from a tobacco virus sample using a prototype MRFM instrument.

Keywords: Gauusian noise, Bayes Model, Gibbs technique and sparse Image.

AR-93 An Elgamal Type Digital Signature Scheme

Over Circulant Matrices

B. Umaprasada Rao1, R. Mohana Ramana

2 and P. Vasudeva Reddy

3

1Dept. of Engg. Mathematics, Dr. L.B. College of Engineering (W), Visakhapatnam. 2Dept. of GEBH, Sri Vidhyanikethan Engineering College, A.Rangampet, Tirupati.

3Dept. of Engg. Mathematics, College of Engineering, Andhra University, Visakhapatnam.

Abstract: Digital signature schemes are one of the most important consequences of public key

cryptography. These schemes provide authentication, integrity, non-repudiation to digital

communications. During the last three decades many signature schemes have been proposed

using different mathematical hard problems. For example two of the most popular groups in the

discrete logarithm problem on the group of units of a finite field and the group of rational points

of an elliptic curve over a finite field.

In this paper we proposed an ElGamal like digital signature scheme using the group of

non-singular circulant matrices. We proved that this signature scheme is secure under Diffie-

Hellman problem over the group of circulant matrices. When compared with signature schemes

constructed using finite fields, this scheme offers the same level security with less computational

cost.

Keywords: Circulant Matrices, Discrete Logarithm Problem, Digital Signature Scheme.

AR-94 Wavelet Transform Based Dental Image Registration for

Aligning Dental Radiographs

Dr.Yaswanth Kumar.Avulapati1 and Dr. R. Seshadri

2

1Academic Consultant, Dept of Computer Science, S.V.University, Tirupati. 2Director, S.V.U.Computer Center, S.V.University, Tirupati.

Abstract: Biometrics is the science of establishing the identity of an individual based on their

physical, chemical and behavioral characteristics of the person. The paper presents a new method

for automatic image registration based on estimating wavelet coefficients.

The algorithm developed for the method is tested by developing a Image Registration

Tool using MATLAB. Developed algorithm has been applied on pre and post surgery periapical

dental x-ray images. Proposed method uses four level coarse to fine strategy to register the

images.

Mutual information being the maximization criterion; correlation coefficient, mean,

standard deviation and Root Mean Square Error (RMSE) are also computed for comparing the

algorithm with other algorithms. Results show that error due to proposed method is less

compared to graylevel and manual methods of registration

Keywords: Dental Image Registration Tool, Periapical images, Wavelet transform, X-rays.

M.Tech.Students‟

Abstracts

AR-10 A Sharp and High Resolution Image Generation Using DWT and SWT

Kakarla Vijay and Sk. Mujafar Ahmed Dept. of ECE, ADAM‟S Engineering College, Palvancha, AP. [email protected]

Abstract: In this paper, By using DWT, SWT and Bicubic interpolation technique, we are able to

enhance the image resolution of input image by using high frequency components. DWT is

applied in order to decompose an input image into different subbands. Then the high frequency

subbands as well as the input image are interpolated by using bicubic technique. The estimated

high frequency subbands are being modified by using high frequency sub band obtained through

SWT. Then all these subbands are combined to generate a new high resolution image by using

inverseDWT (IDWT). The quantitative and visual results are showing the superiority of the

proposed technique over the conventional and state-of-art image resolution enhancement

techniques.

Keywords: Discrete wavelet transform, image super resolution, stationary wavelet transform.

AR-15 Digital License Plate Identification Kakarla Vijay

1 M.Tech. and K. Sundar Srinivas

2 M.Tech.

1Dept. of ECE, ADAM‟S Engineering College, Palvancha, AP. [email protected] 2Dept. of ECE, NCET, Jangareddygudem. [email protected]

Abstract: A Digital license plate identification (DLPI) is used in many applications and a number

of techniques have been proposed. But, many of them worked under restricted conditions, such

as fixed illumination, limited vehicle speed, designated routes, and stationary backgrounds. The

proposed DLPI technique consists of two main modules: a license plate locating module and a

license number identification module. The former characterized by fuzzy disciplines attempts to

extract license plates from an input image, while the latter conceptualized in terms of neural

subjects aims to identify the number present in a license plate. Experiments have been conducted

for the respective modules. Different images taken from various scenes and under different

conditions were employed. the identification rate of success is 95.6%, the overall rate of success

for our DLPI algorithm is 93.7%.

Keywords: Color edge detector, fuzzification, license number identification, license plate

locating, license plate recognition (LPR), self-organizing (SO) character recognition, spring

model, topological sorting, two-stage fuzzy aggregation.

AR-16 Model – RF Based Classroom Intelligence Computation K. Sundar Srinivas

1 and M. Naga Lakshmi Kalyani

2

1M.Tech., Dept. of ECE, NCET, Jangareddygudem, [email protected] 2Asst. Prof, Potti Sriramulu College of Engineering & Technology, Vijayawada, India

Abstract: This system is a contemporary one for class rooms in colleges and schools. Nowadays,

the systems were getting into digital form under this concept, information from the department

head can be displayed on the LCD screen in the classroom and this also displays the number of

students enter into the class. Parallel, this information will be data based using GSM and RF

Technology. IR sensors are used to display the count of students which are interfaced with PIC

micro controller. And this also represents the room temperature where fans can automatically

switch on based on the threshold temperature that is programmed in PIC.

Keywords: Peripheral Interface Controller (PIC), GSM, IR Sensors.

AR-23 To Analyze Performance in Reactive Routing Protocol

Using Mobile Adhoc Networks

K. Venkararamana1, S. Hemasri

2 and K. Muniramaiah

3

1Assistant Professor, Dept of CSE, ChadhalawadavenkataSubbaiah College of Engineering, Tirupati.

[email protected], 9908754752 3Assistant Professor, Dept of MCA, ChadhalawadaRamanamma Engineering college, Tirupati.

[email protected], 91 8106997999 2M.Tech.CSE [II/II], SIETK, PUTTUR. [email protected]

Abstract: Mobile Ad hoc networks(MANET) represent complex distributed systems that

comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and

temporary adhoc network topologies, allowing people and devices to seamlessly internet work in

areas with no preexisting communication infrastructure e.g., disaster recovery environments. The

goal of the routing protocol is to have an efficient route establishment between a pair of nodes.

Routing protocols used in wired network cannot be used for mobile ad-hoc networks because of

node mobility .Many routing protocols such as proactive, reactive and hybrid. Reactive routing

protocols have been found to be user friendly and efficient when compared to other routing

protocols. There are a variety of reactive routing protocols suchas AODV, DSR, LAR1, LMR,

ABR,SSI, AOMDV, MRAODV, ARA. In this study a comparison and performance evaluation

of two reactive routing protocols AODV and DSR are done using NS-2simulator to identify the

protocol that is best suited for MANET‟S.

Keywords: MANET, Routing protocols, AODV, DSR.

AR-24 To analyze difference between AODV and DSDV Routing

Protocols in MANETs 1K. Venkata Ramana

1, P.C. Devi

2 and B. Chaithanya

3

1Assistant Professor, Dept. of CSE, Chadalawada VenkataSubbaiah College of Engineering and Technology,

Tirupati. [email protected] 2M.Tech CSE [II/II], SIETK, PUTTUR. [email protected]

3Assistant Professor, Dept of CSE, Chadalawada VenkataSubbaiah College of Engineering and Technology,

Tirupati. [email protected]

Abstract: Mobile Ad hoc Network (MANET), is a self-configuring infra structure less network

of mobile devices Connected by wireless links. Each device in a MANET is free to move

independently in any direction, and will therefore change its links to other devices frequently. In

this paper we are presenting two mobile ad-hoc routing protocols DSDV and AODV. Here the

DSDV is a proactive protocol depending on routing tables which are maintained at each node.

The AODV is a reactive protocol, which find a route to a destination on demand, whenever

communication is needed. Considering the bandwidth, throughput and packet loss, in both

DSDV and AODV routing protocols, DSDV is best suited for only smaller networks and AODV

is suited for general Ad-hoc networks.

Keywords: Mobile Ad hoc Networks (MANETs), Quality of Service (QoS), AODV, DSDV,

routing.

AR-25 Determining the Positioning Algorithm for Fingerprinting using WLAN

Indu Maurya1 (M.tech, IT), Ashish Maurya

2 and Priyanka Maurya

3

1GCET, Gr. Noida. [email protected]

2Axis College, Kanpur. [email protected]

3GBU, Gr.Noida. [email protected]

Abstract: The effectiveness of Location Based Systems depends on the correct location of users

and mobile devices ,the outdoor location can be easily calculated, while using technologies such

as GPS (Global Positioning System), it is more difficult to obtain when the location scenario is

an indoor environment. Several technologies and location techniques can be used in this field.

One of these techniques is FINGERPRINTING which consists in two different phases: The first

phase is the: calibration phase: when data is collected and the Fingerprint Map is generated. The

second phase is the: on-line phase: where data collected by the mobile device and the data

collected in the calibration phase are used to estimate the location of the mobile node. Location

systems are more and more viewed as a necessary element of a WLAN system. Accuracy is the

most important issue in location system, especial in the indoor WLAN location detection. Indoor

location systems are affected by indoor environment both due to multi-path and man-made

effects. Wireless channel is more unpredictable then wired channel because of environmental

factors such as- multipath fading, shadow fading, doppler spread, delay spread, frequency offset,

time offset etc. The purpose of this thesis is to avoid the transmission of signal pattern which

might result in an unwanted regularity in the transmitted signal. For this purpose we are doing

WLAN-OFDM SIMULATION to avoid all this effects. Orthogonal frequency division

multiplexing (OFDM) is becoming the chosen modulation technique for wireless

communications. OFDM can provide large data rates with sufficient robustness to radio channel

impairments. Many research centers in the world have specialized teams working in the

optimization of OFDM for countless applications. The purpose of this report is to provide

Simulink model to simulate the basic processing involved in the generation and reception of an

OFDM signal in a physical channel and to provide a description of each of the steps involved.

Keywords: existing WLAN location method, fingerprinting, location determination technique,

orthogonal frequency division multiplexing (OFDM).

AR-35 Comparative Study of Routing Techniques, Their Attacks and

Prevention methods in MANET

MD Sirajul Huque, M.Tech. II Year CSE, 9963828634

Abstract: MANET (Mobile Adhoc Network)refers to a multihop packet based wireless network

composed of a set of mobile nodes that can communicate and move at the same time , without

using any kind of fixed wired infrastructure. Routing is a core problem in networks for delivering

data from one node to another node. Absence of infrastructure and dynamic nature of MANET

invites intruder to launch attack, one of them is flooding. The objective of this paper is to present

a comparative study of various routing protocols of MANET. And we have discussed different

types of attack that have been launch during routing between nodes.

Keywords: Mobile Ad hoc Networks (MANET), Intruder, Flooding, Routing Protocols.

AR-63 Providing Location-Aware End-to-End

Secure communication in Wireless Sensor Networks

Thota Kesava Rao1, C. Viswanadh

2 and G. Suresh

3

1M.Tech.(CSE), Siddartha Institute of Technology and Science, Puttur. 2Assistant Professor, Dept. of CSE, SITS,

Tirupati. 3Assistant Professor, Dept. of Mechanical Engineering, KMM Engineering College, Tirupati.

Abstract: Providing desirable data security, that is, confidentiality, authenticity, and availability,

in wireless sensor networks (WSNs) is challenging, as a WSN usually consists of a large number

of resource constraint sensor nodes that are generally deployed in unattended/hostile

environments and, hence, are exposed to many types of severe insider attacks due to node

compromise. Existing security designs mostly provide a hop-by-hop security paradigm and thus

are vulnerable to such attacks. Furthermore, existing security designs are also vulnerable to many

types of Denial of Service (DoS) attacks, such as report disruption attacks and selective

forwarding attacks and thus put data availability at stake. In this paper, we seek to overcome

these vulnerabilities for large-scale static WSNs. We come up with a location-aware end-to-end

security framework in which secret keys are bound to geographic locations and each node stores

a few keys based on its own location. This location-aware property effectively limits the impact

of compromised nodes only to their vicinity without affecting end-to-end data security. The

proposed multifunctional key management framework assures both node-to-sink and node-to-

node authentication along the report forwarding routes. Moreover, the proposed data delivery

approach guarantees efficient en-route bogus data filtering and is highly robust against DoS

attacks. The evaluation demonstrates that the proposed design is highly resilient against an

increasing number of compromised nodes and effective in energy savings.

AR-75 HYBRID Markov Model is used for Tracking in MANET

with Structure Free Approach

M. ChandraMouli Reddy1, K. Mahesh Kumar

2 and J. Sreekanth Reddy

3

1M.Tech, MBA,(PHD), 2,3M.Tech., VTTW, Tirupati.

Abstract: Mobile Adhoc Network does not require fixed infrastructure support for tracking to

reach a Target node. We need to accomplish a goal is to improve the effectiveness of structure –

free tracking. We already recognizes a problem of tracking of a mobile target node in a mobile

adhoc network(set-up). We includes a generic tracking framework for a online tracking

applications. We proposes a online statistically estimated hybrid estimated markov model of an

gradient based protocols of the target‟s likely direction. A PMBT is a probabilistic online tracking

algorithm that computes information utilities at each step, and then chooses the next step toward

the target based on the maximum expected utility. We provides a light weight implementation of

the state of nodes in each cell and a polite gossip mechanism for forwarding the tracking

messages. We consider a benchmark approach to solve a tracking problem in MANET, A PMBT

algorithm significantly outperforms both gradient-based and markov model with the help of polite

gossip mechanism.

Keywords: MANET, PMBT, Gradient Model, HMM, target, tracking.

AR-76 Ontology Model is Used for Gathering Multidimensional Analysis of

Web Information in Single Hierarchy

K. Mahesh Kumar1, M. ChandraMouli Reddy

2 and J. Sreekanth Reddy

3

1M.Tech., VTTW, Tirupati. [email protected] 2M.Tech., MBA(PHD), 3M.Tech., VTTW, Tirupati.

Abstract: Many models have been utilized for only a gathering knowledge from either a global

knowledge base or a user local knowledge base in a single dimensional manner.

Experimentally, Those models have been proved as an inefficient results for collecting an

accurate information. Previous Approaches shows more precision value and less recall value. It

does not successful for gathering meaningful knowledge. It occurs a replication copies of

knowledge, it does not eradicates data redundancy. An Ontology Model is proposed for

representing a user background knowledge and for personalized web information gathering. An

Ontology model is used for extracting global knowledge from personalized LCSH system

repositories and Discovering user background knowledge from the user local instance

repositories are searching in a multidimensional manner. But, information presents in a single

hierarchy. It exists a semantic relationships for gathering global information. Finally, we can

conclude that the Ontology model are significantly evaluates a substantial improvements

achieved by a F1 measure experimental results are promising an efficiency of an knowledge

discovery and it is reliable. It shows more recall value, less precision value. This model have

been proved as a Benchmark model by applying it to a common system for Hierarchical Web

information gathering.

Keywords: Ontology, personalization, semantic relations, world knowledge, local instance

repository, user profiles, web information gathering, single hierarchy, multi dimensional

mining,replication, recall, precision.

AR-77 Estimating Marketing Analysis for Customer Behaviour With the

Help of Bayesian Classification

K. Mahesh Kumar1, M. ChandraMouli Reddy

2 and J. Sreekanth Reddy

3

1M.Tech., VTTW, Tirupati. [email protected] 2M.Tech., MBA(PHD), 3M.Tech., VTTW, Tirupati.

Abstract: To stay competitive, In Marketing Sector need to develop a viable customer retention

strategy. Since a key to the successful development of such a strategy rests with customer

relationship management, Marketing Sector should identify the most profitable ways to build and

maintain a loyal customer relationship. With the Heavy competition of global market for national

and international business. Customer relationship management is a major area is used to find out

the preferences and purchases of a particular product. CRM takes the customers as the center, it

gives a new life to the enterprise organization system and optimizes the business process. In an

effort to help enterprises understand their customers‟ shopping behavior and the ways to retain

valued customers, In Previous Approaches have been proved as an unsuccessful, It does not

shows approximate result for customer shopping analysis, we consider those approaches are not

to be effective to find out hidden customer classifier pattern analysis. We propose data mining

techniques. As a rising subject, data mining is playing an increasingly important role in the

decision support activity of every walk of life. This paper mainly focused on the research of the

customer classification and prediction in commercial banks based on Naive Bayesian classifier

that accommodates the uncertainty inherent in predicting customer behavior.

Keywords: customer relationship management, customer classification and prediction, data

mining, naive Bayesian classifier.

AR-87 An efficient Fault-Tolerance Technique using Check-pointing

and Replication in Grids using Data Logs

S. Dilli Babu1, Ch. Ramesh Babu

2 and Dr. Ch. D. V. Subba Rao

3

1Dept. of CSE, SVUCE, SVU, Tirupathi. [email protected] 2Research Scholar, JNTUK. [email protected]

3Professor, Dept. of CSE, SVUCE, SVU, Tirupathi. [email protected]

Abstract: Grid computing systems are increasingly growing importance in the present world with

advances in the network technology. Grids are composed of many geographically disturbed

resources, each having its own administration domain. Grid computing involves decentralized

heterogeneous, geographically distributed resources that can work on a job together. Since the

resource availability is dynamic in nature, the grid infrastructure is prone to failure of job lose or

delay. So in order to adapt to the failure, fault tolerant mechanism must be implemented.

Commonly used techniques for fault tolerance are check pointing and load replication. To have

an efficient fault tolerance mechanism this paper comes up with an optimal check pointing

algorithm based on real-time work load logs that reduces overhead caused due to check pointing.

The proposed system uses Job replication to ensure completion of work, optimal replication and

dynamic Load balancing is used to avoid overload in any resources and to achieve maximum

resource utilization and maximize throughput.

Keywords: Grid Computing, Fault Tolerance, Work load logs.

AR-88 Comparison study of an efficient Algorithm for Discovering

Maximum Frequent Item sets

P. B. Archana1 and Dr. A. Ram Mohan Reddy

2

1II M.Tech., 2Professor and Head, Dept. of CSE, SVUCE, Tirupati.

Abstract: Max Frequent pattern mining is a essential technology and step in mining associations

rules. Max frequent item sets contain the exact information of all the frequent itemsets. This

paper proposed a fast algorithm for discovering maximum frequent itemsets called FA-DMFI

which can store attributes association information through scanning database only once. Then the

max frequent itemsets is discovered in the association matrix by means of the bottom-up and top-

down searching strategy. Therefore the algorithm execute time is reduced remarkably.

Experimental results show its effectiveness and efficiency.

Keywords: Data mining, Association rule, Max frequent itemset, Information matrix.

AR-89 A Refuge Business model for Cloud Computing using novel AES

Approach

D. Prathima1 and Dr. P. Venkata Subba Reddy

2

1II M.Tech, 2Assoc.Professor, Dept. of CSE, SVUCE, Tirupathi.

Abstract: Enterprises usually store data in internal storage and install firewalls to protect against

intruders to access the data. They also standardize data access procedures to prevent insiders to

disclose the information without permission. In cloud computing, the data will be stored in

storage provided by service providers. Service providers must have a viable way to protect their

clients‟ data, especially to prevent the data from disclosure by unauthorized insiders. Storing the

data in encrypted form is a common method of information privacy protection. If a cloud system

is responsible for both tasks on storage and encryption/decryption of data, the system

administrators may simultaneously obtain encrypted data and decryption keys. This allows them

to access information without authorization and thus poses a risk to information privacy. This

study proposes a business model for cloud computing based on the concept of separating the

encryption and decryption service from the storage service. Furthermore, the party responsible

for the data storage system must not store data in plaintext, and the party responsible for data

encryption and decryption must delete all data upon the computation on encryption or decryption

is complete.

A CRM (Customer Relationship Management) service is described in this paper as an example to

illustrate the proposed business model. The exemplary service utilizes three cloud systems,

including an encryption and decryption system, a storage system, and a CRM application system.

One service provider operates the encryption and decryption system while other providers

operate the storage and application systems, according to the core concept of the proposed

business model.

This paper further includes suggestions for a multi-party Service-Level Agreement (SLA)

suitable for use in the proposed business model.

AR-90 A Baseline System For Telugu – English Translation Using Moses

D. Praveena1 and Dr. A. Ram Mohan Reddy

2

1II M.Tech., 2Professor and Head, Dept. of CSE, SVUCE, Tirupati.

Abstract: This paper describes the development of a statistical machine translation system based

on the Moses decoder. Several different translation strategies were explored. We also use a

statistical language model that is based on a continuous representation of the words in the

vocabulary. A huge parallel corpus is required for performing the statistical machine translation.

The aim of this paper is to explore Statistical Machine Translation using the Moses toolkit for

creating a Telugu-English translator. To perform Telugu- English translation, a parallel corpus of

this language has been provided. Larger the size of the data provided for the training of the

Moses decoder, more accurate is the translated output.

AR-92 Classification of Agriculture Land using Spatial Data mining

techniques based on remote sensing images with GIS

M. Sirish Kumar and Dr. S. Jyothi II M.Tech., Professor, Dept. of Computer Science, SPMVV, Tirupati.

Abstract : India is a predominantly agriculture based country with more than two thirds of its

population living in rural areas where agriculture is the main occupation of people. Agricultural

operation is closely connected with natural resources that have an obvious spatial character

which is considered essential character of Geographic Information Systems (GIS).

The landuse- land cover pattern of a region is an outcome of both natural and socio-economic

factors and their utilization by man in time and space. Land is becoming a scarce commodity due

to immense agricultural and demographic pressure. Hence, information on landuse-land cover

and possibilities for their optimal use is essential for the selection, planning and implementation

of land uses schemes to meet the increasing demands for basic human needs and welfare.

Increasing human interventions and unfavorable bio-climatic environment has led to

transformation of large tracts of land into wastelands. Satellite remote sensing play an important

role in generating information about the latest landuse-land cover pattern in an area and its

temporal changes through times. The information being in digital form can be brought under

Geographical Information System (GIS) to provide a suitable platform for data analysis, update

and retrieval.

Students’

Abstracts

ST-01 Digital Image Processing

R. N. Vinodini and P. Hareesha B.Tech(CSE), Vaishnavi Inst. of Technology for Women, Tirupathi.

Abstract: This paper mainly explains about the basic technological aspects of digital image

processing. It has a special reference to satellite image processing. Image processing deals with

the initial processing of raw image data to correct for geometric distortion, to calibrate the data

radio metrically and to eliminate noise present in the data. The objective of the information

extraction operations is to replace visual analysis of the image data with quantitative techniques

for automating the identification of features in a scene. It involves the analysis of multispectral

image data and the application of statistically based decision rules for determining the land cover

identity of each pixel in an image. Then it is to categorize all pixels in a digital image into one of

several land cover classes or themes. This classified data may be used to produce thematic maps

of the land cover present in an image.

ST-02 Pill Camera

D. Anusha MCA V Semr, Sri Padmavati Mahila Visvavidyalayam, Tirupati. [email protected]

Abstract: The aim of this technology is to make products in a large scale for cheaper price and

increased quality the current technologies have attained a part of it, but the manufacturing

technology is at macro level. The future lies in manufacturing product right from the molecular

level. Research in this direction started way back in eighties. At that time manufacturing at

molecular and atomic level was laughed about. But due to advent of nanotechnology we have

realised it to a certain level. One such product manufactured is PILL CAMERA, which is used

for the treatment of cancer, ulcer and anaemia. It has made revolution in the field of medicine.

This tiny capsule can pass through our body, without causing any harm. It take the

pictures of our intestine and transmits the same to the receiver of the computer analysis of our

digestive system. This process can help in tracking any king of disease related to digestive

system. Also we have discuss the drawbacks of PILL CAMERA and how these drawbacks can

be over come using Grain sized motor and bi-directional wireless telemetry capsule. Besides this

we have reviewed the process of manufacturing products using nanotechnology. Some other

important applications are also discussed along with their potential impact on various fields.

Types of Pill Cameras, Advantages and Disadvantages are discussed in this paper.

ST-03 Study on methodology of Ethical Hacking

G. Archana III sem MCA, SVEC, A.Rangampet, Tirupati. [email protected]

Abstract: In this paper we have reviewed on fast growing areas in network security, and certainly

an area that generates much discussion is that of ethical hacking. In today's context where the

communication techniques have brought the world together; have also brought into being anxiety

for the system owners all over the globe. Today more and more software are being developed

and people are getting more and more options in their present software„s. But many are not

aware that they are being hacked without their knowledge. One reaction to this state of affairs is

a behavior termed ―Ethical Hacking" which attempts to proactively increase security protection

by identifying and patching known security vulnerabilities on systems owned by other parties. A

good ethical hacker should know the methodology chosen by the hacker like reconnaissance,

host or target scanning, gaining access, maintaining access and clearing tracks. For ethical

hacking we should know about the various tools and methods that can be used by a black hat

hacker apart from the methodology used by him. Also when thinking from the point of view of

the developer, he also should be aware of these since he should be able to close holes in his

software even with the usage of the various tools. With the advent of new tools the hackers may

make new tactics. But at least the software will be resistant to some of the tools.

ST-04 Surface Technology

O. Pushpalatha and d. Ramyakrishna V sem mca, spmvv, tirupati. [email protected]

Abstract: Surface computing breaks down traditional barriers between people and

technology, changing the way people interact with all kinds of everyday content, from

photos to maps to menus. The intuitive user interface works without a traditional mouse or

keyboard, allowing people to interact with content and information by using the ir hands and

natural movements it is a natural user interface that allows people to interact with digital

content the same way they have interacted with everyday items such as photos, paintbrushes

and music their entire life, with their hands, with gestures and by putting real-world objects

on the surface. It is used for teaching purpose, it is used in banks, restaurants, organizations

etc. It is wireless. It isn't simply a touch screen, but more of a touch-grab-move-slide-resize-

and-place-objects-on-top-of-screen and this opens up new possibilities that weren't there

before.

ST05 Expert System

S. Latha and Ch. Geetha V Sem MCA, SPMVV, Tirupati. [email protected], [email protected]

Abstract: This paper explores an approach to building an adaptive expert system in an

environment of human-computer collaboration. Components of an adaptive system are

identified, with an emphasis on the mechanisms that enable adaptive behavior to occur.

Knowledge representation in a rule-based, object-orientated expert system is described through

the establishment of appropriate relationships utilizing heuristic rules, objects, and agents. The

experimental expert system displays low level learning capabilities that show sufficient promise

to warrant further research.

ST-06 Green Computing

D. Anitha Sahithi & K. Jyothi V Sem MCA, SPMVV, Tirupati. [email protected]

Abstract: Green computing is the environmentally responsible use of computers and related

resources. Such practices include the implementation of energy-efficient central processing units

(CPUs), servers and peripherals as well as reduced resource consumption and proper disposal of

electronic waste (e-waste). Green Computing is now under the attention of not only

environmental organizations, but also businesses from other industries. In recent years,

companies in the computer industry have come to realize that going green is in their best interest,

both in terms of public relations and reduced costs. This paper will take a look at several green

initiatives currently under way in the computer industry. Green computing is the utmost

requirement to protect environment and save energy along with operational expenses in today's

increasingly competitive world. The importance of green computing is discussed in this paper.

ST07 Efficiency of Sliding window protocol using POOSL

K. Padma and G. Hareesha

III MCA, Sree Vidyanikethan College, A.Rangampet, Tirupati.

[email protected], [email protected]

Abstract: In this paper we have analyzed a “sliding window protocol” is a feature of packet-

based data transmission protocols. Sliding window protocols are used where reliable in-order

delivery of packets is required, such as in the data link layer (OSI Model) as well as in the

Transmission Control Protocol (TCP). The sliding window algorithm is widely used in many

standard network protocols. It can ensure a correct data transfer over unreliable channels where

packets may be duplicated, lost, or reordered. An abstract executable performance model of the

protocol is created in POOSL. Several simulation results can be derived from this model in

various network environments and different parameter settings. When we design adaptive

algorithms or novel protocols with the sliding window algorithm, these results are very helpful to

identify optimal parameter settings and to determine a number of key-parameters such as the

window size, the timeout period and the packet size before the implementation of the protocols.

We improve the correctness of a sliding window protocol with an arbitrary finite window size n

and sequence numbers modulo 2n.

ST-08 A Review on Interaction Design for Touch screen Applications

M. Thipna and K. Thulasi III Sem MCA, SVEC, A.Rangampet, Tirupati. [email protected], [email protected]

Abstract: In this paper we studied various rules for designing the user interface, specifically for

touch screens applied devices. It requires a screen and interaction design, which differs

considerably from normal user interface design. It compares finger-operated with stylus-operated

touch screens, comparison like Interaction, Operation, Speed, etc. This paper covers the

technologies like Resistive, Surface capacity, Surface Acoustic Wave (SAW). In this paper we

are going to review the Golden rules like Speed, Testing, Characteristics like Direct control,

Speed control, Accuracy, Footprint. How to maintain the Screen Space, Buttons used and also

we are going to discuss about the selection menus. In this paper, we re-examine the use of Touch

Screen Technology, the limitations. Today, a large share of population is personal computer, yet

the touch screens have been adopted by computer users of all abilities because it is simple, fast

and innovative. In future there would be no use of mouse and keyboard as they would be

replaced by touch screen.

ST-09 A Survey on 4G Communications M. Kalavathi and M. Kavya

III Sem MCA, SVEC, A.Rangampet, Tirupati.

[email protected], [email protected]

Abstract: In this paper we have studied mobile communication is continuously one of the hottest

areas that are developing at a booming speed, with advanced techniques emerging in all the

fields of mobile and wireless communications. Current times are just the beginning for deploying

3G mobile communication systems, while research on the next generation of mobile

communications, 4G wireless and mobile networks begin to pave the way for the future. This

paper re-examine various visions of 4G from a technical perspective. After a brief review on the

development history and status of mobile communications and related 4G perspectives, we

present an overall 4G feature framework based on the kernel concept of integration, in which two

key features (diversity and adaptability) of the three targets (terminals, networks, and

applications) are described in detail. The concepts of both external and internal diversity of each

target are defined to illustrate the causes and solutions of the adaptability feature. Then, along the

entire 4G domain, each feature in the framework is deeply discussed from a technical standpoint,

in which promising techniques and possible research issues for sufficient support of adaptability

are also proposed. Finally, a short summary on 4G visions is presented as a continuum of

features in the development of the mobile communications world.

ST-10 Data Warehousing & Data Mining M. Lokesh Reddy and G. Venkatesh Babu

Dept. of MCA, SVEC, A.Rangampet, Tirupati. [email protected], [email protected]

Abstract: -In this paper an Introduction to Data Mining is presented, as it is the extraction of

hidden predictive information from large databases is a powerful new technology with great

potential to help companies focus on the most important information in their data warehouses

and to best apply these advanced techniques, they must be fully integrated with a data warehouse

as well as flexible interactive business analysis tools which is possible by Architecture of Data

Mining. An overview of different stages/processes are identified such as Selection,

Preprocessing, Transformation and Data Mining. Data Mining applications like

Retail/Marketing, Banking, Insurance & Health care and Medicine are presented and a glance of

Need of Data Warehouse and functionalities of Data Mining. We represent different modules in

Data information, i.e. to preserve the security and integrity of mission-critical OLTP

applications, while giving you access to the broadest possible data of database. This results to

consume hundreds of gigabytes - or even terabytes - of disk space which requires an effective

solution for the above stated problem and coming to Criteria for Data Warehouse we have few

phases, they are Load Performance, Load Processing, Data Quality Management and Query

Performance. The conclusion is that, business needs to built through deep and far-reaching

strategic thinking. The strategic ideas that support data warehousing as a strategic initiative are

learning and foreknowledge. Data warehousing meets the fundamental business needs.

ST-11 Cloud Computing - New Cutting Edge to Business

T. Madhavi & Y. Anusha Dept. of MCA, SVEC, A.Rangampet, Tirupati.

[email protected], [email protected]

Abstract: This paper gives a glimpse of understanding on cloud computing as a technology for a

new era. Its potential is considered so vast that it is surely going to give up a new dimension for

the generation to come. Cloud computing technology has been a new buzzword in the IT

industry and expecting new horizon for coming world. It is a style of computing which is having

dynamically scalable virtualized resources provided as a service over the Internet. It reduces the

time required to procure heavy resources and boot new server instances in minutes, allowing one

to quickly scale capacity, both up and down, as ones requirement changes. This technology is

ready to cater to the small and medium business segment. The enterprises are exploring the

possibilities of adopting this technology, it is imperative for these enterprises to critically

evaluate the feasibility of this technology for their specific businesses.

Computing consumers consume resources as a service and pay only for resources that they use.

Many cloud-computing offerings employ the utility computing model, which is analogous to

how traditional utility services (such as electricity) are consumed, while others bill on a

subscription basis. Sharing "perishable and intangible" computing power among multiple tenants

can improve utilization rates, as servers are not unnecessarily left idle (which can reduce costs

significantly while increasing the speed of application development).This paper provides brief

details about the cloud computing with an overview of key features about the new focused

technology.

ST-12 Natural Computing Interface Through Artificial Cloud Computing

D. J. Samatha Naidu1, Dr. P. Chitti Babu

2, G. Suresh

3 and S.Shabir

4

1Assistant professor, MCA Department, APGCCS, Rajampet. [email protected] 2Professor&Principal, APGCCS, Rajampet. [email protected]

3,4MCA final year students, APCCS, Rajampe. [email protected]

Abstract: Cloud computing is a deployment model leveraged by IT in order to reduce

infrastructure costs and/or address capacity/scalability concerns. Cloud computing is not about

the application itself; it is about how the application is deployed as how it is delivered. End-users

use applications, and an application is not cloud computing. It is the infrastructure and model of

deployment that defines whether it is cloud computing, and even then, it's never cloud computing

to the end-user, only the folks involved in developing and deploying that application. Cloud ware

is an extension of cloud computing but they do not enable businesses to leverage cloud

computing. Cloud computing is rapidly increasing in popularity. Companies such as RedHat,

Microsoft, Amazon, Google, and IBM are increasingly funding cloud computing infrastructure

and research, making it important for students to gain the necessary skills to work with cloud-

based resources. Cloud Computing refers to both the applications delivered as services over the

Internet and the hardware and systems software in the datacenters that provide those services.

The services themselves have long been referred to as Software as a Service (SaaS). The

datacenter hardware and software is what we will call a Cloud. When a Cloud is made available

in a pay-as-you-go manner to the general public, we call it a Public Cloud; the service being sold

is Utility Computing.

ST-13 A Conceptual way of Cryptography in Smart Cards for

Vehicle control System

D. J. Samatha Naidu1, Dr. P. Chitti Babu

2, S. Shabir

3 and S. RIYAZ

4

1Assistant professor, MCA Department, APGCCS, Rajampet. [email protected] 2Professor&Principal, APGCCS, Rajampet. [email protected]

3,4MCA final year students, APGCCS, Rajampet. [email protected], [email protected]

Abstract: In the age of universal electronic connectivity, of viruses and hackers of electronic

eaves dropping and electronic fraud there is indeed no time at which security does not matter.

The issue of security and privacy is not a new one however, and the age-old science of

cryptography has been in use, since people had information that they wish to hide. Cryptography

has naturally been extended into realm of computers, and provides a solution electronic security

and privacy issue. As the technology increases, Smart Cards (e.g.: SIM cards, Bank cards, Health

cards) play very important role in processing many transactions with high level of security. This

security level achieved by means of Cryptography. In this paper i am presenting an introduction

to cryptography, basics of Smart Cards, the role of cryptography in Smart Cards, and the

processing of an example transaction involving security (Bank Card).

ST-14 Data Mining and Warehousing

Kammara Mohanachari

I Sem M.Sc. Computer Science, Vikrama Simhapuri University, Nellore.

[email protected], 9441715051.

Abstract: Many software projects are accumulated by a great deal of data, so we really need

information about the effective maintenance and retrieving of data from the database. The

newest, hottest technology to address these concerns is data mining and data warehousing. Data

Mining is the process of automated extraction of predictive information from large databases. It

predicts future trends and finds behavior that the experts may miss as it lies beyond their

expectations. Data Mining is part of a larger process called knowledge discovery, specifically,

the step in which advanced statistical analysis and modeling techniques are applied to the data to

find useful patterns and relationships. Data warehousing takes a relatively simple idea and

incorporates it into the technological underpinnings of a company. The idea is that a unified view

of all data that a company collects will help improve operations. If hiring data can be combined

with sales data, the idea is that it might be possible to discover and exploit patterns in the

combined entity. This paper will present an overview of the different process and advanced

techniques involving in data mining and data warehousing.

ST-15 Bloom Box Energy Y. Prasanthi and K. Ravali

B.Tech. ECE IV, [email protected], [email protected]

Abstract: World has been constantly struggling with the energy problems. Scientists are

searching for new economic, clean, renewable and efficient sources of energy. We are unable to

find any reliable energy resource which will satisfy all our needs. Now the world has been

introduced to Bloom Energy, a new entry in the fuel cell business which claims to be ready to

revolutionize the energy economy. Bloom Box has been embraced by big names such as eBay,

Google, Staples. The human demand for energy is enormous and exponentially increasing.

Today, the energy sector is one of the most potential and profitable sector. As 80 to 90 percent of

the world‟s total energy comes from combustion of fossil fuels which are limited and create

pollution, the need to find other renewable, non-exhausting and clean energy resources is

increasing. The traditional approach to energy production has many challenges such as emission

of green gases. Mr. K. R. Sridhar, an Indian-American rocket scientist and co-founder and CEO

of Bloom Energy has now come up with a Bloom Box which is suppose to meet all these

challenges. Bloom Energy Server (generally called as Bloom Box) is a small size cubical

fuel cell box which can provide sufficient energy to 100 average U.S. homes or 30,000 sq. feet

office building. Bloom Energy Server with the size of refrigerator is able to produce 100 kW of

energy using hydrocarbons such as gasoline, diesel, methane or biogas to produce electricity.

Company claims that the Bloom energy Server is build on a patented solid oxide fuel cell

technology and is a new class of distributed power generator.

ST-16 Current Techniques for Fingerprint Recognition Padmaja and Siva Sankar Raju

I Sem M.Sc.Computer Science, Vikrama Simhapuri University, Kavali. [email protected]

Abstract: My Honors project is to investigate the current techniques for fingerprint recognition.

This target can be mainly decomposed into image processing, feature extraction and feature

match. For each sub-task, some classical and some up-to-date methods in literatures are

analyzed. Based on the analysis an integrated solution for fingerprint recognition is developed

for demonstration. Fingerprint image analysis for automatic identification technology has been

developed for use in a number of major applications. Important industries affected by this

technology include network security and protection, smart money, ATM systems for many

major government sectors. In this paper we discuss the major components of the technology

including the fingerprint system.

ST-17 A DSP based On-Line UPS G. Siva Ramaiah and K. Nagaraju

IV ECE, BITS, Adoni, Kurnool(Dt). [email protected],919963835240

Abstract: Many facilities such as patient health care centers, data processing systems, critical

telecommunication links, LAN servers, offices etc rely on uninterruptible power supplies (UPS)

to maintain a continuous supply of power in case of line outage. In addition to requiring

continuous power, many critical nonlinear loads are sensitive to the incoming line transients and

input harmonic voltage distortion. Conventional UPS systems operate to protect against such

disturbances using complex filtering schemes, often employing large passive components.

Among the various UPS systems online UPS provides maximum protection to such loads against

any power problems. Because of multiple power conversion stages, online UPSs have been the

most complex and expensive type of systems. Today‟s low cost, high performance Digital Signal

Processors(DSPs) provide an improved and cost- effective solution for online UPS design,

making them software controllable, adding some facilities like remote configuration and

monitoring and other network management facilities. This paper presents the basic design and

merits of using real time digital signal processing (DSP) control of UPS systems.

ST-18 Eyegaze Communication System

S. Muni lakshmi1 and B. Uma Maheswari

2

1Lecturer, 2V Sem MCA, Dept. of Computer Science, SPMVV, Tirupati.

Abstract: The field of human computer interaction has been undergoing a new renaissance lately.

While many companies have, and continue to spend millions to develop highly visually

appealing GUIs and state-of-art interaction systems for the common users since the inception of

desktops, the development of interactive systems for the disabled has taken a kick start relatively

recently. And the Eyegaze systems are one of the most pivotal inventions in this context. The

Eyegaze System is a communication and control system for people with complex physical

disabilities. You run the system with your eyes. By looking at control keys displayed on a screen,

a person can synthesize speech, control his environment (lights, appliances, etc.), type, operate a

telephone, run computer software, operate a computer mouse, and access the Internet and e-mail.

Eyegaze Systems are being used to write books, attend school and enhance the quality of life of

people with disabilities all over the world.

ST-19 A Survey on Artificial Intelligence

Neethravathi A. and M. Jagadeesh Chowdary III Sem MCA, SVEC, A. Rangampet, Tirupati.

[email protected], [email protected]

Abstract: Artificial intelligence is a branch of computer science concerned with creation of

computer systems that exhibits some form of intelligence. Artificial intelligence is concerned

with two basic ideas 1) Thought processes of humans 2) Representing those processes via

machines symbolic processing, heuristics and pattern matching are the key elements of artificial

intelligence. The pivotal software tool for Artificial intelligence is lisp (List processing

programming language). The hard ware tool is "lisp machine". Newell and Simon proposed a

model of human problem solving that makes use of the analogy between computer processing

and human information. Artificial intelligence is widely used in various fields. Perception and

knowledge representation in computer become theme of many Artificial intelligence researches.

Expert systems are computerized programs that imitate humans. Natural language

processing is a field in Artificial intelligence that processes natural language. Another important

application of Artificial intelligence is the field of robotics. Robot is mechanical Artificial

intelligence. The application of Artificial intelligence relates to almost many fields. Artificial

intelligence has civilian uses, professional uses, and applications in music, military and gaming.

Artificial intelligence theories imply much futuristic applications which are expected to progress

as fast as computer technology.

ST-20 Palm Vein Technologies Rupa Devi A. and N. Udaya Lakshmi

MCA V Sem, SPMVV, Tirupati. [email protected]

Abstract: Palm vein technologies are one of the upcoming technologies which is highly secure. It

is the world‟s first contactless personal identification system that uses the vein patterns in human

palms to confirm a person‟s identity. It is highly secure because it uses information contained

within the body and is also highly accurate because the pattern of veins in the palm is complex

and unique to each individual. Moreover, its contact less feature gives it a hygienic advantage

over other biometric authentication technologies.

The palm secure works by capturing a person‟s vein pattern image while radiating it with near-

infrared rays. The Palm Secure detects the structure of the pattern of veins on the palm of the

human hand with the utmost precision. The sensor emits a near-infrared beam towards the palm

of the hand and the blood flowing through these back to the heart with reduced oxygen absorbs

this radiation, causing the veins to appear as a black pattern. This pattern is recorded by the

sensor and is stored in encrypted form in database, on a token or on a smart card.

Veins are internal in the body and have wealth of differentiating features, assuming false identity

through forgery is extremely difficult, thereby enabling an extremely high level of security. The

Palm Secure technology is designed in such a way that it can only detect the vein pattern of

living people. The scanning process is extremely fast and does not involve any contact meaning

that Palm Secure meets the stringent hygienic requirements that are normally necessary for use in

public environments.

ST-21 A Survey on Cloud Computing and Applications

G. Prasanthi and J. Rekha III Sem MCA, SVEC, A.Rangampet, Tirupati. [email protected], [email protected]

Abstract: This paper presents details regarding cloud computing, its architecture, benefits,

services, types of clouds. This paper also presents a brief view about cloud storage and also its

present part of economy for most popular businesses. The Cloud computing technology has

been widely applied in e-business, e-education. Cloud computing platform is a set of Scalable

large-scale data server clusters, it provides computing and storage services to customers Thus

cloud computing provide a super-computing power. This cloud of computers extends beyond a

single company or enterprise. The applications and data served by the cloud are available to

broad group of users, cross-enterprise and cross-platform.

ST-22 5G Mobile Technology S. Muni lakshmi

1 and N.Bharati

2

1Lecturer,

2V Sem

MCA, Dept. of Computer Science, SPMVV, Tirupati.

Abstract: 5G technologies will change the way most high-bandwidth users access their phones.

With 5G pushed over a VOIP-enabled device, people will experience a level of call volume and

data transmission never experienced before. 5G technology is offering the services in Product

Engineering, Documentation, supporting electronic transactions (e-Payments, e-transactions)

etc. As the customer becomes more and more aware of the mobile phone technology, he or she

will look for a decent package all together, including all the advanced features a cellular phone

can have. Hence the search for new technology is always the main motive of the leading cell

phone giants to out innovate their competitors. Recently apple has produced shivers all around

the electronic world by launching its new handset, the I-phone. Features that are getting

embedded in such a small piece of electronics are huge. The 5g design is based on user-centric

mobile environment with many wireless and mobile technologies on the ground. The selection

of the RAT is performed by the mobile terminal by using the proposed user agent for multi-

criteria decision making based on the experience from the performance measurements performed

by the mobile terminal.

ST-23 A Survey of Routing Protocols in Mobile Ad Hoc Networks and

Wireless Sensors

C. R. Surendra Reddy and K. Ravi Babu III Sem MCA, SVEC, A.Rangampet, Tirupati. [email protected], [email protected]

Abstract: In this paper, we have studied Mobile Ad Hoc Network (MANET) which is a

collection of Mobile Ad hoc network (MANET) is a collection of Multi-hop wireless mobile

nodes that communicate with each other without centralized control or established infrastructure.

The wireless links in this network are highly error prone and can go down frequently due to

mobility of nodes, inference and less infrastructure. Therefore, routing in MANET is a critical

task due to highly dynamic environment. In recent years several routing protocols have been

established for mobile ad-hoc networks and prominent among them are DSR, TORA. An ad-hoc

network is a temporary infrastructure less network. formed dynamically by mobile devices

without turning to any exciting centralized administration .To send packets to remote nodes uses

other intermediate nodes as relays and ask them to forward its packets .For this purpose ,a

distributed routing protocol is required. Because the devices used are mobile, the network

topology is unpredictable, and it may change at any time. In this paper, we drive a GloMosim

based simulation study, to investigation the mobility effects on the performance of several

mobile ad-hoc routing protocols, and also paper provides an overview of these protocols by

presenting their characteristics, and functionality, benefits and limitations and then makes their

comparative analysis so to analyze their performance. In this paper it has been observed in detail

about how the performance of these Protocols can be improved.

ST-24 Introduction to Network Security

M. Kullai Reddy I Sem M.Sc.Computer Science, Vikrama Simhapuri University, Kavali.

[email protected]

Abstract: Network security is a complicated subject, historically only talked by well-trained and

experienced experts. However as more and more people become “wired”, an increasing number

of people need to understand the basics of security in a networked world. This document was

written the basic computer user and information system manager in mind, explaining the

concepts needed to read trough the hype in the market place and understand risks and hoe to deal

with them. Some history of networking is included, as well as introduction to TCP/IP and

internet working. We go on to consider risk management, network threats, firewall, and more

special-purpose secure networking devices. This is not intended to be a “frequently asked

questions” reference, nor is it a “hands-on” document describing how to accomplish specific

functionality. It is hoped that the reader will have a wider perspective on security in general, and

better understand how to reduce and manage risk personally, at home, and in the work place.

ST-25 Application of Visualization Technology in Spatial Data mining

K. Bhargavi and K. P. JayaPrakash

II Sem MCA, SVEC, A.Rangampet, Tirupati.

[email protected], [email protected]

Abstract: Spatial data mining and spatial data visualization are two comparatively popular

technical methods in recent years, in essence, both purpose is to find geography

phenomena what spatial data express and find various knowledge and laws implicit

in geography entity. so it is necessary to combine both organically and form a new

research direction - Visualization Spatial Data Mining (VSDM). This paper mainly

discusses the key relationships of visualization and spatial data mining, the main

Application of visualization theories and technologies in spatial data mining, the main

methods and examples of visualization spatial data mining, we also present a reference model

Visualization Spatial Data.

ST-26 A Survey on Apriori Algorithm on Association Rules

N. Chandana and R. Dharani III Sem MCA, SVEC, A. Rangampet, Tirupati. [email protected], [email protected]

Abstract: Apriori algorithm is the most classical algorithm in association rule mining, but it has

two fatal deficiencies: more scans for the databases and generates a great deal of candidate

itemsets. To solve these two deficiencies of Apriori algorithm, an efficient and fast algorithm

based on Pattern Matrix is proposed, which solves these two problems: scanning for the

databases is cut down to one time and not generating the candidate itemsets but generating the

frequent itemsets directly. It greatly reduces the temporal complexity and spatial complexity of

the algorithm and highly promotes the efficiency of Aprior algorithm. Because of the rapid

growth in worldwide information, efficiency of association rules mining has been concerned for

several years.

ST-27 3G vs WiFi

Lingamurthy A. and K. Darshan III Sem MCA, SVEC, A.Rangampet, Tirupati. [email protected], [email protected]

Abstract: In this paper we are going to compare and contrast two technologies for delivering

broadband wireless Internet access services: “3G vs WiFi”. The former 3G, refers to the

collection of third generation mobile technologies that are designed to allow mobile operators to

offer integrated data and voice services over mobile networks, and also we are going to the

802.11b wireless Ethernet standard that was designed to support wireless LANs. Although the

two technologies reflect fundamentally different services, industry and architectural design goals,

origins and philosophies. Each has recently attracted a lot of attention as candidates for the

dominant platform for providing broadband wireless access to the Internet. It remains an open

question as to the extent to which these two technologies are in competition or, perhaps, may be

complementary. If they are viewed as in competition, then the triumph of one at the expense of

the other would be likely to have profound implications for the evolution of the wireless internet

and structure of the service provider industry. In this paper we conclude that the article offers a

qualitative comparison of two wireless technologies.

ST-28 Bandwidth Estimation in Broadband Access Networks

L. R. Manohar Reddy III Sem MCA, SVEC, A.Rangampet, Tirupati. [email protected]

Abstract: In this paper we have re-examined how much work on developing techniques for

estimating the capacity and the available bandwidth of network paths based on end-point

measurements. The focus has primarily been on settings where the constrained link can be

modeled as a point-to-point link with a well-defined bandwidth, serving packets in FIFO order.

In this paper, we point out that broadband access networks, such as cable modem and 802.11-

based wireless networks break this model in various ways. The constrained link could (a) employ

mechanisms such as token bucket rate regulation, (b) schedule packets in a non- FIFO manner,

and (c) support multiple distinct rates. We study how these characteristics impede the operation

of the various existing methods and tools for capacity and available bandwidth estimation, and

present a new available bandwidth estimation technique, Probe-Gap, that overcomes some of

these difficulties. Our evaluation is based on experiments with actual 802.11a and cable modem

links.

ST-29 Haptic Technology

V. Latha & M. Sowjanya III Sem MCA, SPMVV, Tirupati

[email protected], [email protected]

Abstract: Engineering as it finds its wide range of application in every field not an exception

even the medical field. One of the technologies which aid the surgeons to perform even the most

complicated surgeries successfully is Virtual Reality.

Even though virtual reality is employed to carry out operations the surgeon‟s attention is

one of the most important parameter. If he commits any mistakes it may lead to a dangerous end.

So, one may think of a technology that reduces the burdens of a surgeon by providing an

efficient interaction to the surgeon than VR. Now our dream came to reality by means of a

technology called “HAPTIC TECHNOLOGY”.

Haptic is the “science of applying tactile sensation to human interaction with

computers”. In our paper we have discussed the basic concepts behind haptic along with the

haptic devices and how these devices are interacted to produce sense of touch and force feedback

mechanisms. Also the implementation of this mechanism by means of haptic rendering and

contact detection were discussed.

We mainly focus on „Application of Haptic Technology in Surgical Simulation and

Medical Training’. Further we explained the storage and retrieval of haptic data while working

with haptic devices. Also the necessity of haptic data compression is illustrated

ST-30 5pen PC Technology

R. Hemalatha & G. Priyamvada

III Sem MCA, SPMVV, Tirupati.

[email protected], [email protected]

Abstract: P-ISM (Pen-style Personal Networking Gadget Package), which is nothing but the

new discovery, which is under developing, stage by NEC Corporation. P-ISM is a gadget

package including five functions: a pen-style cellular phone with a handwriting data input

function, virtual keyboard, a very small projector, camera scanner, and personal ID key with

cashless pass function. P-ISMs are connected with one another through short-range wireless

technology. The whole set is also connected to the Internet through the cellular phone function.

This personal gadget in a minimalist pen style enables the ultimate ubiquitous computing.