Full Catalogue 2005 09
-
Upload
alok-bansla -
Category
Documents
-
view
224 -
download
0
Transcript of Full Catalogue 2005 09
-
8/8/2019 Full Catalogue 2005 09
1/64
1
Catalogue
of
B.Tech. Project Reports
Batch - 2005-09
Abstracts
Resource Centre
DA-IICTGandhinagar - 382007
-
8/8/2019 Full Catalogue 2005 09
2/64
i
Introduction
The Resource Centre team is happy to bring out this catalogue listing B. Tech. Projects,
submitted by the 2005-2009 batch students to the Institute. This document covers in all 172
projects submitted by 2005-09 batch students and are listed in alphabetical order under eachyear by student’s surname. Each entry of the project provides the bibliographical details, such
as author (with ID number), title, page numbers, year of submission, supervisor name, call
number, accession number, keywords and abstracts. At the end, author and supervisor
indexes have been provided to enable the user to locate a specific entry in this catalogue.
Hope you will find this document useful. We would be happy to have your comments and
suggestions, if any, to improve this catalogue further.
Updated on: 25/03/2010 Resource Centre Team
-
8/8/2019 Full Catalogue 2005 09
3/64
i
Contents
Batch - 2005-2009
1. Ultra Wide Band Transmission and Receiver Design
By Abhinav Vijay and Kunal Malik
1
2. 1
3. Parking Lot Management System
By Ambuj Agarwal
1
4. Intelligent Traffic Management - Segregation of Vehicles using Video Images
By Himanshu Agarwal
2
5. On Uniquely Diagnosable Fault Sets in Diagnosable Systems
By Ritu Agarwal
2
6. -n Junction Solar Cell Simulator - Graphical Simulation and Physics of Solar Cell
By Vineet Aggarwal
2
7. Context Aware Semantic Service Discovery
By Ankit Agrawal
2
8. Design of Stable Adaptive IIR Notch Filter Using all-pass Lattice Structure
By Manish Agrawal and Ankit Kumar Jain
3
9. Detection of Digital Image Manipulation
By Rohin Agrawal
3
10. Design and Development of Mobile Intelligent Tutoring Systems
By Anuj Kumar
3
11. Health-checking and verification of the DDR3 Subsystem and Survey of clock Domain
Crossing
By V. V.Aravindh
3
12.
Hybrid Approach to Digital Watermarking Using Independent Component Analysis and Spread
Spectrum
By Arjun Singh
4
13. Experimental Evaluation of Dynamic Data Structure for Point Location Problem
By Sumit Bagga
4
Air for Human Simulator (AFHS) : Graphical Simulation and Physical Study of Inhaled Air
By Aditya Prakash and Sidharth Kumar
-
8/8/2019 Full Catalogue 2005 09
4/64
ii
14. Performance Analysis Tools for ARM
By Sumit Bagla
4
15. BREW MP Eclipse Plugin
By Ankit Baphna
4
16. Broadband Beamforming
By Puneet Baser and Anik Mundra
5
17. Contour Extraction of moving object in a still camera video
By Sangam Batra
5
18. Aperture Coupled Microstrip Antenna
By Rohit Bhagya and Pawan Gupta
5
19. Polarimetric SAR Data Processing
By P.V. Vijay Bhargava
5
20. Parallel Query Optimization for Join Framework of Pig Latin
By Nitesh Bhatia
6
21. Predict Neural Networks output more accurately using OpenMP Application Program Interface
(API)
By Avinash Bikualla
6
22. PC-Based Tool for Comprehensive Test Application
By Srikanth Reddy Bontha
6
23. No-Three-in-Line Problem
By Ravi Teja Boppudi
6
24. Optical Character Recognition
By P. Satish Chandra
7
25. Acyclic Orientation of Undirected Graphs to Maximize Reachability
By Sakshi Chandra and Somya Agarwal
7
26.
Bluetooth Security Using Identity Based EncryptionBy Vikrant Chaplot
7
27. Algorithms for finding a Minimal Dominating Set in a Graph
By Kalyan Cheedi
7
28. OLAP Technology for Business Intelligence Analytics System in Retail Enterprises
By B. K Nagarjuna Chitneni
8
-
8/8/2019 Full Catalogue 2005 09
5/64
iii
29. Design Pattern Recognition Using DSM
By Aditya Chittor
8
30. Activity and Budget Monitoring System for ATMA
By Kishan Singh Chouhan
8
31. Designing CIL Connector To Scyther
By Sidhartha Chauhan
8
32. Development and optimization of CMOS Structured ASIC libraries
By B. Aneesha Chowdhary
9
33. Hafnium Oxide Gate Dielectrics for Microelectronics Applications
By Pallavi Daggumati
9
34. Lifestyle Modificator
By Abhishek Daiya
9
35. Robot Motion Planning
By Udaya Bhaskar Dantuluri
9
36. A Novel Design for a Current Feedback Amplifier
By Apurva Dargar and Ankit Mundra
10
37. Improvised filter designs for Performance Enhancement of Depth Estimation using Single
Monocular Images
By Das, Aniruddha and Ramnani, Vikas
10
38. Mobilizing Community Health Workers to Improve Maternal Health in India
By Prabhu Dutta Das
10
39. Vehicle make and model recognition
By Akash Dayal
11
40. A Case Study in System Dynamics
By Rounak Dholakia and Krishna Abhinav
11
41.
High Performance Implementation of Pulsed OFDM For Ultrawideband Communications
By Hima Kireeti Srikanth Dhulipala
11
42. Semantic Web for Agriculture Production (SWAP)
By Ojas Dubey and Vishal Lalwani
11
43. Depth estimation in a Low Depth of Field image 12
-
8/8/2019 Full Catalogue 2005 09
6/64
iv
By Apuroop Gadde
44. A Randomized Linear Time Algorithm to find Minimum Spanning Trees
By Ramachandra Rao Gadde
12
45. On-Line Fair Resource Allocation Scheme in OFDMA Systems Using Cooperative Game
Theory
By Rohan Gaddh and Khyati Jain
12
46. Development of GSM Protocol through LPC2106 Microcontroller
By Amit Garg and Puneet Jindal
12
47. Robust Design for M-Banking Client Application on Mobile using Design Patterns
By Sagun Garg
13
48. Semantic Search Engine
By Nitin Gopi
13
49. Developing Ontology for Indian Technical Institutes
By Gowtham Srinivas P. and Reddy, D. Ravindra Kumar
13
50. Portfolio Optimization
By Abhas Goyal and Rubish Gupta
13
51. An optimized LVQ algorithm for multi-interval discretization of continuous values
By Ankush Goyal and Abhinesh Mishra
14
52.
Ontology Matching
By Deep Goyal
14
53. Public-Key Cryptography Using Paraunitary Matrices over Fields of Characteristic Two
By Gourav Goyal
14
54. Formal Analysis of Hierarchical Key Assignment Schemes
By Aakar Gupta and Milan Saini
14
55. Development of C Simulator for AWG Based Analog & digital Video Interface
By Abhishek Gupta
15
56. Extending cursor - A New Technique for Enhancing Target Acquisition
By Amit Gupta
15
57. Coreference Resolution Using Inductive Logic Programming
By Anurag Gupta
15
-
8/8/2019 Full Catalogue 2005 09
7/64
v
58. File system for Real Time Applications with Continuous Media
By Divyank Gupta
15
59. Web Service Discovery and Composition
By Rohit Gupta and Abhishek Somani
16
60. Secure Data Transmission Protocol for Distributed Wireless Sensor Networks
By Sachin Gupta
16
61. A 0.7 Volt High Performance Three Stage OPAMP Using Forward Body Biased Technique
By Shekhar Gupta
16
62. Crop Estimation Model : Prediction and Simulation
By Ravi Grandhi
16
63. Algorithm for converting SQL into relational algebra
By Ashok Kumar Iraveni
17
64. Mash-Maker: An Integrated framework for developing next generation Mashups
By Amit Jain and Sumit Pandey
17
65. Virtual/Soft token Based Two-factor Authentication
By Anurag Jain
17
66. DDR2 SDRAM Model Verification Using Palladium and Axis
By Anurag Jain
18
67.
Dynamic Time Warping Based Approach to Dialect Recognition in Indian English
By Chaitanya Jain
18
68. Porting Free RTOS on WildCense
By Manish Jain
18
69. Is the attack valid? A Tool for Detecting Erroneous Attacks Found by Scyther
By Mohit Jain
18
70. Service Mashups
By Madan Lal Jat
19
71. A Proof Technique for Greedy Algorithms
By Anju Jha
19
72. Face Detection and Recognition
By Harsha Jhunjhunwala
19
-
8/8/2019 Full Catalogue 2005 09
8/64
vi
73. Disk Scheduling Algorithms for Continuous media file systems
By Nitesh Jindal
20
74. Enabling MultiPoint in Educational Tools
By Apurva Joshi
20
75. Automated Correction of Faulty Security Protocols
By Prachi Joshi
20
76. Multimedia Content Encryption
By Prakash Josyula
20
77. Question nswering in Bio Medical Text
By Anshika Kalra
21
78. Cross-layer Design for Multimedia streaming in Cluster Based Adaptive Two-hop Wireless
Network
By Poornachand Kalyampudi
21
79. Performance Analysis of Approximate Nearest Neighbor Searching for k-d and BBD trees
By T. Karteek
21
80. Waste Monitoring System
By Swapnil Khandelwal
21
81. A Study on Kalman Filter and Estimation Techniques
By Ravin Khanted
22
82. Parallel and Dynamic Graph algorithms for Shortest Path Problem
By Anil Kishore and Koneru, Tilak
22
83. Scheduling in Wireless Fading Systems Using Cross layer Design Approach
By Nishanth Koganti
22
84. Creation of Test Framework and Testing of WCDMA-AS Air Interface software
By Sravani Ratna Konkimalla
22
85.
Channel Estimation using Pilots in OFDM SystemsBy Sreekanth Kotapati
22
86. Non-homogenous AR (auto-regressive) Model Based prior for Multi-resolution Fusion
By R.V.S.Krishna
23
87. Vertex coloring Problem and maximal Independent Set Construction
By V. Krishna Teja
23
-
8/8/2019 Full Catalogue 2005 09
9/64
vii
88. Evolutionary Algorithms for MultiObjective Optimization
By Kashyap Kuchipudi
23
89. FPGA Implementation of JPEG2000 Arithmetic Encoder
By Lakkaraju Ramesh
23
90. A Connector between Scyther and SHRIMP
By Lal, Siddhartha
24
91. Formal Verification of Security Protocols using ALSP
By Suvansh Lal
24
92. System Dynamics of IT & BPO Company
By Manmeet Singh and Vishav Vikram Kapoor
24
93. ASIC Design
By Divya Macharla
24
94. Development of a Secure Steganographic Technique
By Swetha Sri Madhavapeddi
25
95. Distributed Vertex Colouring Algorithms based on Greedy Colouring
By Ratnesh Malviya
25
96. Invariant Texture Analysis
By Sudha Praveen Maremanda
25
97. Clozer - An Authoring Environment for Creating Interactive Classroom Learning Content
By Akhil Mathur
25
98. Ontology for UG program in CS/IT
By Praveen Meel
26
99. Low Power Motion Estimation Circuit Using Adiabatic Logic
By Saransh Mehrotra
26
100. Analyzing Multiple Regression and Neural Network in Modeling a Dynamic Pattern
By Umang Merwana and Jitendra Kumar Pandey
26
101. Implementation of Hidden Markov Model for Building a Speaker Dependent Isolated Word
Recognizer
By Mayank Mishra
26
102. To Define Accurate Channel Capacity by Merging Electromagnetic and Information Theory 27
-
8/8/2019 Full Catalogue 2005 09
10/64
viii
By Ashish Mittal and Prashant Bajaj
103. Farmer Information System for ATMA
By Ankit Modi
27
104. Authentication of Digital Images
By Siva Charan Muraharirao
27
105. Probe Sequences in Hash Tables
By Murthy, R. Satyanarayan
27
106. Fragile Domain Watermarking Techniques
By Pradeeep Nagireddy
28
107. Implementation and Modification of Embedded Zerotree Wavelet Coder for Still Image
compression
By Rajendra Prasad Nalamati
28
108. 1V Rail-to-Rail 12-bit Pipelined ADC
By Nallavelli, Ramya and Yenugula, Naveen
28
109. Algorithm Evaluation for the weighted Vertex Cover Problem
By Amit Nama and Saurabh Mittal
28
110. Securing SSL/TLS against Man-in-the-middle Attack
By Navkar Samdaria
29
111.
Visualization of OWL Ontology
By Vasavi Kumar Nekkanti
29
112. Wasteland Identification & Soil Property Analysis using GIS
By Abhinav Nigam and Anuj Srivastava
29
113. Developing Ontology For Music
By Vikas Nunia and Anukool Tiwari
29
114. Qualitative Analysis of C4.5 Decision Tree Induction Algorithm
By Varun Rajendra Parimi
30
115. Fault Identification In Diagnosable Systems
By Nandini Patnaik
30
116. Hardware Implementation of Full-Search Block Matching Algorithm
By Satish Pitchikala
30
-
8/8/2019 Full Catalogue 2005 09
11/64
ix
117. Effect of Frequency Offset on OFDM
By Praveen Kumar and Vinay Kumar Srivastava
30
118. Low Noise Amplifier Design
By Nikhil Prakash and Saurabh Garg
31
119. Node Localization in Lunar Environment
By N. S.Prithvi Raj Krishna
31
120. Technique to Reduce Vector Generation Time and Resource Requirement
By B.K.Priyanka
31
121. A Novel MAC Layer Configuration Protocol for CR Based Multihop Wirless Networks
By Autul Purohit and Ritika Pareek
31
122. Implementation of Rational Wavelets and Filter Design for Speech Recognition
By Raj Rishi Purohit,
32
123. Enhancements to Repository Management
By G. Ram and Saumya Mittal
32
124. Miniaturized Microstrip Antenna and Microstrip Array Antenna at 1.4 GHz
By Laveen Ramrakhiyani and Nirdesh Kumar
32
125. A Kalman filter estimation approach for modeling Time Series data in Stock Market
By Pankaj Kumar Rathi and Sparsh Verma
32
126.
Real Time Scheduling Using Least-Cost-Last Algorithm
By G. Ravi Shankar
33
127. Text Document Classification Using Finite Mixture Model
By P. Vivek Reddy
33
128. Analysis of Software Architecture using Dependency Manager
By V. S. Goutham Reddy,
33
129. Comparative Analysis of Klein’s and Modified Klein’s Algorithm
By Ravi Kiran Rimmanapudi
34
130. Fast Approach for Stereo Using Particle Swarm Optimization Technique
By Rout, Lipsa Shrabani
34
131. Settlement of Chharanagar
By Mohit Kumar Rungta and Kapil Shahani
34
-
8/8/2019 Full Catalogue 2005 09
12/64
x
132. Experimental Study of Connected Dominating Sets for Mobile Ad-Hoc Networks
By Rohit Kumar Sahoo and Gaurav Parikh
34
133. A Tool for Automatically Generating Security Protocols
By P. Sai Teja and Sawant Tandle
34
134. Computational Geometry -Witness Set and Guard Set Problem
By Sambu Shiva Sai Krishna Prasad
35
135. Metrics on Protein Structure
By P. Shanmukha Sampath
35
136. Path Complexity of Programs
By Shubham Saxena
35
137.
Improving Load-Transient Response of Capacitor less Low Drop out Voltage RegulatorBy Khaja Ahmad Shaik
36
138. Secure Program Execution in Wireless Sensor Networks (WSN)
By Amit Sharma
36
139. Connected Dominating Set in Wireless Ad-hoc Network
By Anshul Sharma and Manish Golcha
36
140. Effects of Integrating Digital Visual Materials for Rural Education
By Ashish Sharma
36
141. Comparison of relative Performance of TEO and VTEO for Emotion Recognition
By Gaurav Sharma
37
142. Ultra Wideband Low-Noise Amplifier Design
By Ruchi Sharma and Kapil Jain
37
143. Preserving Edges In Regularized Constrained Least- Squares Image Restoration
By Sudhanshu Sharma
37
144. MIMO-OFDM Channel Equalization
By Shashank Kumar and Varun Raj C.V
38
145. Weaknesses and Improvements of E-Mail Protocols
By Ajeet Singh Shekhawat
38
146. Virtual Tour of the Institute (DA-IICT) Campus
By Praveen Shekhar
38
-
8/8/2019 Full Catalogue 2005 09
13/64
xi
147. Face Recognition model using 2D PCA and LDA
By Samata Shettigar
38
148. On Acyclic Orientation of an Undirected Graph for Maximizing Reachability
By Kirti Shrinkhala
39
149. Framework for Providing QoS guarantees in Continuous Media Applications
By Ankur Singhal
39
150. Adaptive SVD update algorithms for Channel Estimation in MIMO Systems
By Shruti Singhania
39
151. VoIP Security using Dynamic Authentication and Identity-based Technique
By Rahul Sinha and Swati Verma
39
152. Centralized Printing System
By P. V.Soumya
40
153. Rapid Performance Benchmarking Methodology of Design Architecture with AXI Crossbar
Case Study
By Ankit Srivastava
40
154. Generic Mathematical Model to evaluate Full Chip Dynamic Voltage Drop based on
Operational Frequency and Utilization
By Nishant Srivastava
40
155.
IP Header Compression
By Saurabh Srivastava
40
156. Automatic Identification of Cephalometric Landmarks
By Srujan Kumar V. H. N.
41
157. System Dynamics of a Fresh food Store
By G. S. Neeraj Subramaniyan
41
158. Shortest Path Algorithm
By P.S.V.SuryaNarayana
41
159. Game AI Library for NPC Motions in Mobile Games
By Satyajit Swain
41
160. An Empirical Investigation of Capital Asset Pricing Model in India
By Ankit Talwar and Anushree Goenka
42
-
8/8/2019 Full Catalogue 2005 09
14/64
xii
161. Web-based Application for Querying Institute Ontology
By Rajat Taneja and Shobhneet Bhargava
42
162. Implementation of Coverage Driven Verification for verifying AHB Bus using Axiom CDF
By Rahul Todi
42
163. Feature enhancement and Code Quality improvement for Camera Software
By Sai Gopal Thota
42
164. SMG Web Development
By Anupriya S.Tyagi
43
165. System Dynamics Model for National Parks
By G.Vamshi Krishna
43
166. Developing of Web Services Using WS-Engineer
By T.Vamsi Krishna
43
167. Verification Of Graceful Tree Conjecture
By K. Phani Kumar Varma
43
168. 3D Simulation and Environment Visualization
By Varun Varshney
44
169. Tata Nano: A Case Study Using System Dynamics
By Risav Kumar Verma and Sai Charan Puvvala
44
170.
Low power NEDA based 1D-DCT Architecture
By Harshal Ved
44
171. Implementation of Adaptive Filters using Subband and Frequency Domain Techniques
By Irukulapati Naga Vishnu Kanth and Seshu Srinivas Balu
44
172. Embedding of Binary Trees in Hypercube and Related Graphs
By Khushvant Yadav
45
Author Index 46Supervisor Index 49
-
8/8/2019 Full Catalogue 2005 09
15/64
Resource Centre, DA-IICT B.Tech. Projects 2009
1
B. Tech Projects (Abstracts)
2005-2009
Author: Abhinav Vijay (200501091) and Malik, Kunal (200501119)Title: Ultra Wide Band Transmission and Receiver Design; 5 p.; 2009.
Supervisor: Gupta, SanjeevKeywords: Ultra wide band; UWB; Multiple-mode resonator; Ultra wide band receiver; Advanced design
system; Low noise amplifier. Abstract: This Report presents the work done in the design of an Ultra Wide Band [1] (UWB) Receiver. In
the process of designing the receiver we have integrated Antenna, Band Pass Filter and Amplifierinto one complete circuit. The preferred designs for the integration are Microstrip antenna[2]operating at UWB frequency, multiple-mode resonator(MMR) for the filter and three cascaded Agilent HMMC-5200 series-shunt heterojunction bipolar transistor[3] (HBT) amplifiers foramplifier module. The layout and simulations of the Microstrip Antenna have been performed using Agilent Momentum while the schematics and simulations of filter and UWB amplifiers have been
performed using Agilent Advanced Design System (ADS) Schematic. Before implementing thereceiver we implemented a 915 MHz receiver and a UWB Low Noise Amplifier whose schematics,simulations and results are included herein.
Author: Aditya Prakash (200501013) and Sidharth Kumar (200501014)Title: Air for Human Simulator (AFHS)- Graphical Simulation and Physical Study of Inhaled Air; 4 p.;
2009.Supervisor: Jotwani, Naresh and Dutta, GautamKeywords: Cardiovascular system; Graphical simulation; Human body; MAYA; Respiratory system; Simulation
of physics. Abstract: Air for Human Simulator (AFHS) is a unique and novel approach to understand the course of the
inhaled air inside the human body whereby users can easily understand the steps for the
consumption of air inside our body, with the help of 3D graphical modeling and simulation of thephysics. AFHS subsequently concentrates on the 3D modeling and simulation of the cardiovascularsystem and the respiratory system, the two systems responsible for the proposed process andthereby demonstrates there individual and parallel functionalities with the help of 3D models,simulations and graphs (wherever needed).
Author: Agarwal, Ambuj (200501065)Title: Parking Lot Management System; 3 p.; 2009.
Supervisor: Mitra, Suman K.On site
Supervisor:Piriyakumar, D. Antony Louis, Siemens CT India
Keywords: Parking lot; Integrated systems; Smart cameras; WiFi network.
Abstract: Parking Lot Management essentially deals with the placement of parking spaces, ticketing of theparked vehicle and also managing the empty slots efficiently. Here we discuss a vision based systemthat caters to the first two of the above needs integrating it with the security systems. Apart fromthese the system allows for a flexible platform to add various features at a later point of time.
-
8/8/2019 Full Catalogue 2005 09
16/64
Resource Centre, DA-IICT B.Tech. Projects 2009
2
Author: Agarwal, Himanshu (200501172)Title: Intelligent Traffic Management - Segregation of Vehicles using Video Images; 11 p.; 2009.
Supervisor: Mitra, Suman and Roy, Anil K.Keywords: Background subtraction; Connected component analysis; Dilation, erosion; Template matching;
Tracking. Abstract: One of the key aims of any advanced traffic management system is to be able to identify traffic rule
violating vehicles automatically and soonest as well. The current vehicle detection system, such as
license plate detection, identifies vehicle’s license plate which subsequently may provide only theaddress of the vehicle owner using the RTO database. Our project is targeted to develop a newfeature for any city’s traffic management system by providing an automatic system capable of takingreal-time input from fixed video camera, segregating two wheeler vehicles. We hope that thismodule can then be used for multiple purposes by the City Traffic Commissioner. This reportdescribes the designed algorithm used to achieve the desired goal.
Author: Agarwal, Ritu (200501082)Title: On Uniquely Diagnosable Fault Sets in Diagnosable Systems; 5 p.; 2009.
Supervisor: Amin, Ashok T.Keywords: Fault set; Hybrid fault set; Intermittently faulty units; Permanently faulty units; Syndrome; T-
diagnosable
Abstract: A self diagnosable system is a system which has the capability of testing its subunits anddetermining its faulty units. Various approaches have been developed to identify the set of faultyunits by studying a collection of test results produced by the system. One such approach is todetermine the set of conditions which should be satisfied by a system to have uniquely identifiablefaulty units. Thisreport deals with a set of such conditions and
1. For the case of symmetric invalidation, it rewrites the proof of necessity and sufficiency of theconditions so that it is more accessible2. For the case of symmetric invalidation with permanent faults, it
a. makes explicit a restriction on the size of the fault set andb. simplifies the conditions and develops an efficient algorithm for their implementation.
Author: Aggarwal, Vineet (200501099)Title: p-n Junction Solar Cell Simulator - Graphical Simulation and Physics of Solar Cell; 4 p.; 2009.
Supervisor: Jotwani, Naresh and Parikh, ChetanKeywords: p-n Junction; Solar cell; MATLAB; Absorption coefficient; Optical intensity; Generation rate;
Current, Power. Abstract: The solar cell simulator is designed and built for different p-n homojunction solar cell like Silicon,
Gallium Arsenide and Indium Phosphide. Simulator user starts by entering various parameters forthe solar cell. Simulator then calculates various graphs and different values like power, current andthe efficiency of the solar cell with the help of the physics involved in a solar cell. The user can playthe animation to watch and learn the movements of charge carriers.
Author: Agrawal, Ankit (200501173)
Title: Context Aware Semantic Service Discovery; 4 p.; 2009. Supervisor: Chaudhary, SanjayKeywords: Context; Ontology; Semantics; Service discovery. Abstract: This report is a part of an effort to develop a novel context based mechanism to facilitate semantic
service discovery. Context- awareness is considered to be a key problem in designing more adaptiveapplications. Context modeling and reasoning are important research area of context-awarenesscomputing. At the same time huge amount of data leading to inefficient systems raises a demandfor filtering techniques. A study of existing discovery mechanisms has been done.
-
8/8/2019 Full Catalogue 2005 09
17/64
Resource Centre, DA-IICT B.Tech. Projects 2009
3
Author: Agrawal, Manish (200501073) and Jain, Ankit Kumar (200501205)Title: Design of Stable Adaptive IIR Notch filter using all-pass Lattice Structure; 4 p.; 2009.
Supervisor: C. VijaykumarKeywords: Least mean square (LMS); All-Pass filter; Lattice structure; Notch filter; Finite impulse response
(FIR) filter; Infinite impulse response (IIR) filter; Bit Error Rate (BER). Abstract: In this paper, the adaptive notch filter is implemented using cascades of second order notch filters,
each of which has been realized using cascades of second order all-pass lattice structure. We have
used LMS adaptive algorithm to make the system adaptive. Further, a comparison is done on theconverging property and coefficient stabilization of the FIR filter using different variants of theadaptive algorithm Least Mean Square (LMS) vis. Normalized LMS and block LMS used in ourimplementation. Computer simulations show the relative performance of the different algorithmson the basis of bit error rate (BER), coefficient convergence and stabilization and complexity forthe detection of closely-spaced sinusoids and tracking of nonstationary sinusoidal signals.
Author: Agrawal, Rohin (200501187)Title: Detection of Digital Image Manipulation; 7 p.; 2009.
Supervisor: Roy, Anil K. and Desai, BinitaKeywords: Image Forensics; Image Manipulation; Least square approximation; Surface normals;
Decorrelation.
Abstract: Manipulation in image has been in practice since centuries. These manipulated images are intendedto alter facts – facts of ethics, morality, politics, sex, celebrity or chaos. Image Forensic Science(Image Forensics) can be used to detect manipulation(s) in a digital image. There are many standard way to analyze an image for manipulation. We propose a new method that is based on light and itsshade. It measures the direction of light source and uses the light based technique for identificationof any intentional manipulation in the said digital image.
Author: Anuj Kumar (200501097)Title: Design and Development of Mobile Intelligent Tutoring Systems; 6 p.; 2009.
Supervisor: Banerjee, AsimCo-
Supervisor:Kam, Matthew, Carnegie Mellon University
Keywords: Cellphone; Decision Tree; Intelligent Tutors; English as Second Language (ESL) Abstract: Learners are a diverse population, varying in their skills, interest and learning process. This paper
presents the design, implementation and evaluation of 2-cellphone based intelligent tutors that haveundergone 2 iterations each. Intelligent Tutors are tutors that can adapt to learners response, andprovide individualized learning thus accounting for their diversity. We have designed 2 suchapplications and field-tested them with children. Each application’s tutoring system is representedusing a decision tree that helps in understanding software’s response to numerous inputs form thelearner. This paper presents the development of these decision trees based on participatory design where the applications were modified based on user performance, observation and feedback.
Author: Aravindh, V. V. (200501115)Title: Health-checking and Verification of the DDR3 Subsystem and Survey of Clock Domain Crossing;
6 p.; 2009. Supervisor: Dubey, Rahul
On siteSupervisors:
Varshney, Sanjeev and Dontam, Ramesh Babu
Keywords: DDR3 Subsystem; Synthesis; PCTL; Scheduler. Abstract: This report comprises of the work carried out at ST Microelectronics for the B-Tech project. In
this report, there are details of techniques and issues for synthesis of a given digital design, commondiscrepancies observed in a digital design, as exercised in the industry. An overview of the DDR3subsystem is included. The rationale behind the operation of the DDR3 subsystem and its verification is included. A literature survey on metastability and solutions for this issue is presented
-
8/8/2019 Full Catalogue 2005 09
18/64
Resource Centre, DA-IICT B.Tech. Projects 2009
4
after the verification process of the DDR3 subsystem.
Author: Arjun Singh (200501201)Title: Hybrid Approach to Digital Watermarking Using Independent Component Analysis and Spread
Spectrum; 7 p.; 2009. Supervisor: Mitra, Suman K.
Keywords: Digital Watermarking; Independent Component Analysis; Multiple watermarking; Spread Spectrum Abstract: An effective way to ensure copyright protection and security of digital images is digital
watermarking. This report compares and analyzes Spread Spectrum and Independent Component Analysis techniques for watermarking digital images. As both these schemes exhibit complementaryrobustness to a large range of attacks, we propose a novel hybrid which is double watermarkedusing the two schemes. This hybrid is robust to a wide range of attacks.
Author: Bagga, Sumit (200501038)Title: Experimental Evaluation of Dynamic Data Structure for Point Location Problem; 2 p.; 2009.
Supervisor: Chatterji, SamareshKeywords: Dynamic Data Structure; External Memory; Planar Subdivision; Point Location Abstract: Point Location is a well-known problem in computational geometry with numerous applications in
graphics, geographic information systems, etc. In many of the applications, the data is massive andhas to be stored in external memory. In such situations, I/O performance becomes a critical factor.It is proposed to experimentally evaluate the dynamic data structure put forward by Arge, Brodaland Srinivas Rao.
Author: Bagla, Sumit (200501223)Title: Performance Analysis Tools for ARM; 4 p.; 2009.
Supervisor: Banerjee, AsimOn site
Supervisor:Reddy, Allam Suresh, Engineer, Staff/Mgr, Qualcomm Corp.
Keywords: Babylon; LTTng; Performance analysis tool. Abstract: To identify set of performance analysis tools for Linux OS based systems on ARM platform. The
focus is to analyze the tools, its granularity and accuracy, and provide support for them on theLinux kernel to meet the requirements of BSP (Board Support Package) team of Qualcomm IndiaLtd., Hyderabad.
Author: Baphna, Ankit (200501220)Title: BREW MP Eclipse Plugin; 4 p.; 2009.
Supervisor: Banerjee, AsimOn site
Supervisor: Simhadri, Arun Kumar, Engineer, Staff/Manager, Qualcomm India Pvt. Ltd.
Keywords: Automation, brew; Build; Nmake. Abstract: Qualcomm introduces eclipse plugins for BREW MP which aids developers to develop BREW
applications on an open source platform. Main aim of Qualcomm behind these plugins is to give
the developers all the support that is needed to develop and test BREW MP applications on anopen source platform. This requires support on Eclipse IDE as an alternative for Microsoft’s VisualStudio, CodeSourcery and RVCT as an alternative for ARM compliers and MinGW make/GCCmake as an alternative for Microsoft’s nmake to generate various .bid, .bif and .dll files. My projectis to make a template of the makefile that is compatible with CodeSourcery and RVCT toolchainthat uses functionality of MinGW make that can be used by the makefile generator to generate themakefile needed to build the BREW MP project depending upon the options selected by the user. Also I need to design the framework to test the BREW MP Eclipse plugin and schema to integratethose with the build machine.
-
8/8/2019 Full Catalogue 2005 09
19/64
Resource Centre, DA-IICT B.Tech. Projects 2009
5
Author: Baser, Puneet (200501178) and Mundra, Anik (200501231)Title: Broadband Beamforming; 4 p.; 2009.
Supervisor: C. VijaykumarKeywords: SLC; SONAR; RADAR; ULA; UCA; DOA; MVDR; SVD; CDMA [5] Abstract: The report is projected for analyzing propagating waves thereby extracting signal parameters of
interest and detecting source location from where propagating wave is generated. We will bediscussing various narrowband beamforming algorithms followed by implementation and
simulating results of those algorithms. Beamforming is a technique employed for determining thedirections of propagation of several signals moving past an array. Traditionally, Adaptivebeamforming has been employed primarily in sonar and radar systems. It started with the inventionof the intermediate frequency sidelobe canceller (SLC) in 1959 by Howells. The concept of a fullyadaptive array was developed in 1965 by Applebaum [3]. Beamforming has wide applications inareas of acoustics, SONAR applications and seismology and wireless communication applicationslike RADAR applications.
Author: Batra, Sangam (200501043)Title: Contour Extraction of Moving Object in a Still Camera Video; 5 p.; 2009.
Supervisor: Mitra Suman K.Keywords: Background subtraction; Contour; Convex hull; Frame; Gradient vector flow; Initialization; Snake
Abstract: This report proposes an efficient approach for contour extraction of a moving object in a stillcamera video. For the detection and tracking of moving object, an efficient background subtractiontechnique proposed by Singh et al. is used. Gradient Vector Flow (GVF) model is used for thepurpose of contour extraction. The problem of manually initializing the contour in every frame isaddressed by automating the process of contour initialization. The automation is done using a fastand simple technique. Results are shown for different videos towards the end of the report.
Author: Bhagya, Rohit (200501040) and Gupta, Pawan (200501216)Title: Aperture Coupled Microstrip Antenna; 5 p.; 2009.
Supervisor: Gupta, SanjeevKeywords: Aperture coupled microstrip antenna; Microstrip antenna; Return loss Abstract: Microstrip antennas have become immensely popular in recent times owing to their low
manufacturing cost and compactness and are being increasingly employed in microwave systems. This paper first discusses basics of antenna and aperture coupled microstrip antennas and then goeson to describe the design of a low cost aperture coupled microstrip antenna having a return loss of -37.8 dB at 1.4 GHz.
Author: Bhargava, P. V. Vijay (200501121)Title: Polarimetric SAR Data Processing; 4 p.; 2009.
Supervisor: Banerjee, AsimKeywords: Polarimetric Radar; Speckle Filtering; Polarimetric Signature Extraction; RADARSAT Data Abstract: The European Space Agency developed a tool called PolSARpro to facilitate the accessibility and
exploitation of multi-polarized SAR datasets including those from ESA Third Party Missions(ALOS PALSAR), Envisat ASAR Alternating Polarization mode products, RADARSAT-2 and
TerraSAR-X. Indian Space Research Organization (ISRO) has similar requirements of indigenouslymade tool; fully customized to meet their specific conditions. In this report, I have attempted todescribe the basics of Polarimetry required for understanding the applications of POLSARPRO. The definitions are followed by brief descriptions of the modules implemented.
-
8/8/2019 Full Catalogue 2005 09
20/64
Resource Centre, DA-IICT B.Tech. Projects 2009
6
Author: Bhatia, Nitesh (20001071)Title: Parallel Query Optimization for Join Framework of Pig Latin; 4 p.; 2009.
Supervisor: Chaudhary, SanjayKeywords: Pig Latin; Hadoop; Parallel query processing; High-level language. Abstract: In present era of Internet dominated market, large scale Parallel-Processing data-flow systems have
attracted attention. Pig Latin is a high-level data-flow language that has been build on Hadoop - anopen source map-reduce implementation. This language provides greater transparency in structure
of program and has opened path for automatic optimization. This report proposes optimizationstrategies for Join framework of Pig Latin based on Parallel QueryProcessing techniques. Through optimization we believe that this will trigger a mass migration fromlow-level programming (like direct Map-Reduce or Dryad) to high-level programming (like PigLatin)
Author: Bikualla, Avinash (200501227)Title: Predict Neural Networks Output more Accurately Using OpenMP Application Program Interface
(API); 4 p.; 2009. Supervisor: Chaudary, SanjayKeywords: Backpropagation algorithm; Data mining; Hyperthreading technology; Message passing interface;
multithreading, Neural networks, OpenMP.
Abstract: One of the tasks of Data mining is to classify and predict the data from a large repository ofdatabases. By analyzing the data from different domains, useful information can be extracted. Aneural network is an example of data mining classification techniques. Neural networks have to betrained before they can be used for prediction of data. This requires large repository ofcomputational power. If they are trained sequentially, it takes a large amount of time; therefore it isbetter to implement those using parallel programming techniques. Usage of OpenMP API on Intelmulti-threading architecture will give good results. After implementing this model, we are testing theperformance of this model by comparing the performance of this model in different environments.
Author: Bontha, Srikanth Reddy (200501120) and Dasksha GouriTitle: PC-Based Tool for Comprehensive Test Application; 4 p.; 2009.
Supervisor: Jat, P. M.
On SiteSupervisor:
Sridhar, Nomula, Engineer, Qualcomm India pvt Ltd., Hyderabad
Keywords: CTA (Comprehensive Test Application); FTA (Functional Test Area); XML (Extensible MarkupLanguage); BREW (Binary Runtime Environment for Wireless systems); WM (Windows Mobile).
Abstract: Comprehensive Test Application is an embedded application that resides on the phone and helps intesting various modules present in the phone.Our project objective is making a desktop applicationfor Comprehensive Test Application which will reduce the user’s effort in using Comprehensive Test Application to a very considerable amount and also improves the efficiency.
Author: Boppudi, Ravi Teja (200501214)Title: No-Three-in-Line Problem; 4 p.; 2009.
Supervisor: Chatterji, Samaresh
Keywords: No-Three-in-Line; Jainendra K. Navlakha's Algorithm Abstract: In this project, one of the unsolved problems in Mathematics, No-three-in-line problem, is solved
for even squared matrices using Jainendra K. Navlakha’s algorithm[1] and the algorithm developedby me.
-
8/8/2019 Full Catalogue 2005 09
21/64
Resource Centre, DA-IICT B.Tech. Projects 2009
7
Author: Chandra , P. Satish (200501126)Title: Optical Character Recognition; 5 p.; 2009.
Supervisor: Joshi, Manjunath V.On site
Supervisor:Bagaria, Venkatesh, Siemens
Keywords: OCR; MSER; CSER; Pattern Matching; Sauvola’s Thresholding and Union–Find Abstract: The report consists of different approaches by which a robust machine vision OCR (Optical
Character Recognition) can be implemented. A modular approach, a pattern matching approachand an approach using MSER (Maximally Stable Extremal Regions) was looked at keeping in mindthe simplicity and speed of the algorithm in order to be able to run on embedded hardware.
Author: Chandra, Sakshi (200501101) and Agarwal, Somya (200501186)Title: Acyclic Orientation of Undirected Graphs to Maximize Reachability; 4 p.; 2009.
Supervisor: Amin, Ashok T.Keywords: Acyclic Orientation; Reachability; Undirected graph. Abstract: Let G be an undirected graph with n vertices and m edges. (G, R) denotes acyclic directed graph
obtained from undirected graph G by acyclic edge orientation of G. Let r(G, R) denotes thereachability of (G, R). The problem is to find an acyclic orientation (G, R) of G such that r(G, R) is
maximized.
Author: Chaplot, Vikrant (200501057)Title: Bluetooth Security Using Identity Based Encryption; 4 p.; 2009.
Supervisor: Das, Manik LalKeywords: Bluetooth security; Elliptic curve cryptography; Identity based Encryption; Strand spaces. Abstract: The Bluetooth is a wireless technology which is used to transfer voice and data between Bluetooth
enabled devices separated by short distance. Since the medium of transfer is wireless, securing databecomes utmost important. Most of the security features used in Bluetooth today are based onsymmetric key cryptography having a drawback that the user has to manually enter the secretpasskey into both the communicating devices. In this paper we present one Bluetooth securityprotocol based on Identity Based Encryption. It uses the identity of a device to encrypt the data.
Here security relies on Elliptic Curve Discrete Logarithm Problem. We also present a formal proofof correctness for the proposed protocol using Strand Space Technique.
Author: Cheedi, Kalyan (200501225)Title: Algorithms for finding a Minimal Dominating Set in a Graph; 5 p.; 2009.
Supervisor: Chatterji, SamareshKeywords: Maximal independent set (MIS); Minimum connected dominating set (mCDS); Virtual backbone,
ad-hoc networks. Abstract: The project relates to an application of graph theory in wireless ad-hoc and sensor networks. The
challenge to this field of networks is that the medium and user are mobile or are dynamic in nature.Motivated by the concept of search in a virtual backbone set up is the solution to the problem ofminimal Dominating set (MDS) which finds applications in routing and connectivity in wireless ad-
hoc networks. Also involved with this problem is the problem of maximal independent set (MIS).Solution to MIS makes it easier to implement the problem of MDS. The work in the projectincludes implementing and comparing two algorithms, which are different in approach, by analyzingtheir performance for different cases of connectivity and the number of nodes in the ad-hocnetwork.
-
8/8/2019 Full Catalogue 2005 09
22/64
Resource Centre, DA-IICT B.Tech. Projects 2009
8
Author: Chitneni, B. K Nagarjuna (200501144)Title: OLAP Technology for Business Intelligence Analytics System in Retail Enterprises; 4 p.; 2009.
Supervisor: Banerjee, AsimKeywords: Online analytical processing (OLAP); Intelligence analytics system; Database model Abstract: The relational database model is probably the most frequently used database model today. It has its
strengths, but it doesn’t perform very well with complex queries [1] and analysis of very large sets ofdata. As computers have grown more potent, resulting in the possibility to store very large data
volumes, the need for efficient analysis and processing of such data sets has emerged. The conceptof Online Analytical Processing (OLAP) was developed to meet this need. Now a days BusinessIntelligence applications are powered by OLAP software. OLAP produces a new generation ofanalysis and reporting capabilities through customized “cubes”, where critical business processes inan enterprise, such as product, month, and number of sales are represented as dimensions in thecube. OLAP represents a major improvement in reporting and analysis because the cubes importfrom existing databases, spreadsheets, data warehouses, and data marts into a far more flexible andpowerful reporting and analysis application. Our Project “OLAP Technology for BusinessIntelligence Analytics System” deals with Analytics module to analysis day to day operations basedon reports chosen by the retailers.
Author: Chittor, Aditya (200501129)
Title: Design Pattern Recognition Using DSM; 5 p.; 2009.Supervisor: Jat, P. M.Keywords: Design pattern; Dependency structure matrix. Abstract: Design patterns form a very important part in object-oriented programming. Identifying the design
patterns can make repairing, reverse engineering or analyzing the architecture of software muchsimpler. A Dependency Structure Matrix (DSM) is used to display all the dependency in thesoftware in a tabular form. The DSM can be used to analyze and spot the patterns. It is also aconvenient way to represent them. Design patterns are of 3 types: structural, behavioral andcreational patterns. I have developed a tool to identify structural patterns in software source code(Java only). The tool extracts dependencies from a matrix using conventional static analysis. Thisdata is then used to identify within the software three standard structural patterns including Adapter, Proxy and Decorator. An algorithm is developed to efficiently identify the pattern.
Author: Chouhan, Kishan Singh (200501028)Title: Activity and Budget Monitoring System for ATMA; 10 p.; 2009.
Supervisor: Chaudhary, SanjayKeywords: Information system; ATMA; Activity; Monitoring; Reports; Session bean; Web Service. Abstract: This Project is intended to develop an information system for ATMA to enhance its capabilities for
effective monitoring of activities and budget. Developed system also enables ATMA authorities todo queries to the system like compare between two or more activities and generate results as areport and in a graphically manner too for better analysis. System also provides support forpreparation of ATMA’s monthly, half yearly and annual reports. For implementing this system Ihave used Enterprise Java Beans architecture. Session beans are responsible for all functionalitiesand they can be exposed as Web Services to make this information system worldwide. I haveexposed few session beans as web service as a part of this project.
Author: Chauhan, Sidhartha (200501164)Title: Designing CIL Connector to Scyther; 3 p.; 2009.
Supervisor: Mathuria, Anish M.Keywords: CAPSL; CIL; Scyther; Parser; Connector; JAVA. Abstract: In this report we shall take a look at the concepts behind building a parser in JAVA and later we
shall go into details on how to build a parser which parsers the CIL input and produces Scyther’stool specific language as output. This parser is the Connector we desire.
-
8/8/2019 Full Catalogue 2005 09
23/64
Resource Centre, DA-IICT B.Tech. Projects 2009
9
Author: Chowdhary, B. Aneesha (200501146)Title: Development and optimization of CMOS Structured ASIC Libraries; 4 p.; 2009.
Supervisor: Mandal, ShushantaKeywords: ASICs; Design; Structured ASICs; Standard cell library Abstract: As we all know, a new category of devices - Structured ASICs are increasingly becoming available to
fill in the gap of the programmability spectrum, which consists of FPGAs at one end and thestandard cell ASICs at the other end. Structured ASICs have adopted best features of FPGAs and
standard cell ASICs. They are closer to FPGAs in terms of cost and lesser turn-around design times,and closer to ASICs in terms of low power and performance. This paper addresses issues related todevelopment and optimization of CMOS structured ASIC libraries. Challenges and problemsrelated to development of 65nm and 45nm technology library are addressed. Since technologies arerapidly changing, the cell library has to be developed from scratch more frequently. Building ofthese high performance cell libraries not only reduces time and cost of generation and maintenanceadequately (enabling new technologies to adopt quickly) but reduces design cycle to half.
Author: Daggumati, Pallavi (200501122)Title: Hafnium Oxide Gate Dielectrics for Microelectronics Applications; 6 p.; 2009.
Supervisor: Mohan, S.Keywords: Post deposition annealing; Post metalization annealing; Breakdown voltage; Leakage current.
Abstract: The project undertaken involves the study of the role of Hafnium Dioxide (A high-K dielectric) as areplacement for Silicon dioxide in CMOS technology, electrical characterization of the fabricatedMOS capacitors and analysis of experimentally obtained device parameters. HfO2 film has beendeposited by Electron Beam Evaporation. Post Deposition Annealing and Post metallizationannealing of the sample has been done. Capacitance-Voltage analysis, I-V analysis of the sample preand post annealing has been performed.
Author: Daiya, Abhishek (200501075)Title: Lifestyle Modificator; 4 p.; 2009.
Supervisor: Roy, Anil K.Keywords: Intermittent Network Aware Mobile Application; Connected Limited Device Configuration; Mobile
Information Device Profile; Resting Energy Expenditure.
Abstract: Lifestyle is the way we live our life; what we eat, how and when we eat, how much we exercise, how we cope with stressful situations. Lifestyle Modification is a proactive approach towards optimumhealth & wellness by bringing about appropriate changes in the way you live to Live Life More. Today there are lots of resources available over net for providing information about the food we eatbut the way we live today in a fast running world. But this information is not handy as on date. Alsonobody has the time to go through a book, or on the internet to search for contents in our diet. Theneed of hour is to provide such information fast and easily. This is the project to build a mobileapplication which could provide information easily and keep track of calorie intakes of a person.
Author: Dantuluri, Udaya Bhaskar (200501145)Title: Robot Motion Planning; 4 p.; 2009.
Supervisor: Chatterji, Samaresh
Keywords: Robot motion; Motion planning; Probabilistic roadmap method Abstract: Robotic Motion planning using probabilistic roadmap method is split into two phases they are the
construction phase and query phase. In construction phase we construct a probabilistic roadmap inconfiguration space. This roadmap is a graph where nodes and edges correspond to randomlychosen configurations in free space and simple collision-free motions between the nodesrespectively. These motions are computed using a local method. In the query phase we use thisroadmap to find shortest paths between different pair of configurations.
-
8/8/2019 Full Catalogue 2005 09
24/64
Resource Centre, DA-IICT B.Tech. Projects 2009
10
Author: Dargar, Apurva (200501175) and Mundra, Ankit (200501219)Title: A Novel Design for a Current Feedback Amplifier; 6 p.; 2009.
Supervisor: Parikh, Chetan D.Keywords: Current feedback amplifier; Current conveyor; Unity gain buffer. Abstract: Current Feedback Amplifiers (CFA) are discussed in this report. A detailed analysis of the
complexities involved in designing a Current Feedback Amplifier with a suitable gain at highfrequencies is undertaken. Various modifications made to the distinct stages of a Current Feedback
Amplifier to suit to the specifications are elaborated in this report. Novel Current Feedback Amplifier architectures, which employ Buffers with low output impedance and Current Conveyors with very high output impedance are proposed in this report.
Author: Das, Aniruddha (200501052) and Ramnani, Vikas (200501044)Title: Improvised filter designs for Performance Enhancement of Depth Estimation Using Single
Monocular Images; 10 p.; 2009.Supervisor: Mitra, Suman K.Keywords: Computer vision; Depth estimation; Monocular cues; Filter designs. Abstract: Depth Estimation from Images using monocular cues is a cumbersome process. A number of
methods have been developed for depth prediction. Techniques for depth prediction from staticimages include using binocular vision, focus-defocus, stereo vision and single monocular images.
We have discussed the current technique being used in the depth prediction mechanism being usedfor depth estimation from single monocular images. A number of filters are used to extract keyimage characteristics. The filters used have been applied at multiple scales to take into account localand global features. The Gaussian model is used for machine training. Here an attempt has beenmade to design a filter for a more generic application of Depth Estimation algorithm from SingleMonocular Images, so as to reduce the size of the feature vector being used for machine learning. We have altered the filters, in place, so as to decrease the size of the feature vector to improvise theresults for constrained environments or provide an equivalent quality of result as in the previouspapers. This paper introduces filters that reduce the complexity of the algorithm required for depthestimation by reducing the size of the feature vector. The filter presented here has been optimizedfor texture gradient feature extraction. This paper also introduces a post prediction fourth degreeequation to improvise the result predicted by the trained Gaussian model.
Author: Das, Prabhu Dutta (200501137)Title: Mobilizing Community Health Workers to Improve Maternal Health in India; 6 p.; 2009.
Supervisor: Banerjee, AsimCo-Advisor: Ramachandran, Divya, PHD Candidate, University of California, BerkeleyKeywords: Accountability; ASHA; Persuasion; Training. Abstract: Using community health workers in preventive health interventions can play a pivotal role,
especially in frontier communities. However, their potential role as health promoters is handicappedby issues beyond their control. Issues in training, acceptance and accountability restrict their selfefficacy in promoting health information addressing-leading causes for mortality in developingcommunities. In this report we discuss the possible mobile-technology intervention for facilitatingpersuasive health information aimed at reproductive health. The fact that the phone can be carriedto the client and used for immediate displays makes for an interesting ubiquitous platform. The
platform provides scope not only for building persuasive applications but also for collectinginformation which can be mapped to behavioral changes. We discuss design artifacts for one suchapplication- “ASHA SAHAYAK”, its working and import.
-
8/8/2019 Full Catalogue 2005 09
25/64
Resource Centre, DA-IICT B.Tech. Projects 2009
11
Author: Dayal, Akash (200501048)Title: Vehicle Make and Model Recognition; 4 p.; 2009.
Supervisor: Raval, MehulKeywords: Hamming distance; Harris-plessey corner detector; Still image camera; Vehicle recognition Abstract: With the increasing number of vehicles on the roads a necessity for monitoring the traffic arises. An
aspect of traffic monitoring is to determine the model and make of the vehicles. I propose toimplement a method to recognize vehicles’ model which is based upon background subtraction,
feature extraction by corner detection and feature matching by a hamming distance based metricagainst a standard predefined database.
Author: Dholakia, Rounak (200501078) and Abhinav Krishna (200501087)Title: A Case Study in System Dynamics; 6 p.; 2009.
Supervisor: Chatterji, SamareshKeywords: System dynamics; Nonlinear dynamics; Feedback control; Simulation software Abstract: System Dynamics is grounded in the theory of nonlinear dynamics and feedback control developed
in mathematics, physics, and engineering [1]. It is a very powerful tool to obtain insight intocomplex dynamics systems. Even a system which appears to be very simple perfunctorily turns outto be complex after analysis through this approach. System Dynamics involves interpreting real lifesystems into computer simulation models that allow one to see how the structure and decision-
making policies in a system create its behaviour.
Author: Dhulipala, Hima Kireeti Srikanth ( 200501136)Title: High Performance Implementation of Pulsed OFDM for Ultrawideband Communications; 6 p.;
2009.Supervisor: C. VijaykumarKeywords: Multiband OFDM modulation; Pulsed OFDM; Raised cosine window function. Abstract: In this report, we have mainly described an approach to the implementation of the multiband
orthogonal frequency division multiplexing (MB-OFDM) ultrawideband (UWB) systems whichgives higher performance than the conventional implementations by applying the ideas of pulsedOFDM. By pulsating the normal OFDM symbols with a duty cycle of less than 1, we are achievinga diversity gain given by inverse of the duty cycle of the pulses. The pulsed OFDM can simply be
generated by replacing the digital-to-analog convertor (DAC) in an OFDM transmitter with a pulsetrain generator. The generator produces amplitude-modulated pulses with duty cycles of less than 1. This gives a closer approximation of the signal thus improving our estimation.
Author: Dubey, Ojas (200501107) and Lalwani, Vishal (200501117)Title: Semantic Web for Agriculture Production (SWAP); 4 p.; 2009.
Supervisor: Chaudhary, SanjayKeywords: Semantic web; Ontology; OWL; RDF Abstract: The content available on the World Wide Web today is meant for human consumption. In the
present web scenario the term information retrieval is quite misleading. The semantic web approachis to present only relevant information to the user based on certain concepts and the relationsbetween them. Moreover, it deals with replacing the current web pages with ones that carry machine
processable content along with the formatting information. This can be achieved by maintaining thedata in the form of ontologies and using query builders to extract information from them. Thisproject aims to propose an agriculture information system based on semantic web. The informationsystem, unlike existing system, is not based in key word based search but rather uses a newapproach of dynamic query generation based on user input for context base search.
-
8/8/2019 Full Catalogue 2005 09
26/64
Resource Centre, DA-IICT B.Tech. Projects 2009
12
Author: Gadde, Apuroop (200501092)Title: Depth Estimation in a Low Depth of Field image; 4 p.; 2009.
Supervisor: Joshi, Manjunath V.Keywords: Object of interest; Depth of field; Defocus. Abstract: A low depth of field image belongs to a specific category of images which comprises of only two
types of pixels. Pixels those are either part of object of interest (OOI) or otherwise. This reportproposes a method to obtain the depth information in such kind of images using the concepts of
higher order statistics and wavelet transform. In a typical Low Depth if field image the OOI issharp or in other words focused and the remaining part of the image is blurred or defocused. Wediscuss a method the separate the OOI from the background and also estimate the distancebetween the OOI and the background.
Author: Gadde, Ramachandra Rao (200501132)Title: A Randomized Linear Time Algorithm to find Minimum Spanning Trees; 4 p.; 2009.
Supervisor: Chatterji, SamareshKeywords: Minimum spanning tree; Algorithm; Kruskal’s algorithm; Karger, Klein and Tarjan Algorithm. Abstract: Minimum spanning tree is tree with minimum edge weights in a weighed graph. Many algorithms
have been proposed to find the Minimum Spanning Tree in a weighted graph. One such algorithmis Karger, Klein and Tarjan Algorithm which is a randomized linear time algorithm to find a
Minimum Spanning Tree in a connected graph with edge weights. The aim of the project is to studythe algorithm, implement it and compare it with other existing algorithms.
Author: Gaddh, Rohan (200501106) and Jain, Khyati (200501235)Title: On-Line Fair Resource Allocation Scheme in OFDMA Systems Using Cooperative Game Theory; 5
p.; 2009.Supervisor: C. VijaykumarKeywords: Fairness; Game Theory; Nash Bargaining solution; OFDMA scheduling; Online Scheduling Abstract: This report talks about the problem of resource allocation in Orthogonal Frequency Division
Multiple Access (OFDMA) systems like WiMAX and 3GPP LTE. The resource allocation schemescan be classified into four categories based on their primary objectives: fairness, system throughputmaximization, power optimization and QoS guarantee. A proportionally fair on-line algorithm has
been devised to allocate sub-carriers to the users based on the rates at which they choose totransmit. Once the sub-carriers are allocated fairly by Nash Bargaining Model, they are dynamicallyshuffled between the users as the transmission rates change; in order to minimize the cost andmaximize the system throughput.
Author: Garg, Amit (200501232) and Jindal, Puneet (200501239)Title: Development of GSM Protocol through LPC2106 Microcontroller; 5 p.; 2009.
Supervisor: C. VijaykumarKeywords: ARM7TDMI-S; GSM; LPC2106; SIM300 modem; Microcontroller Abstract: GSM is Global System for Mobile Communication. It is the technology of voice and data
transmission with the help of authenticated SIM card. This is widely used on end user side intelecommunication networks. Our project intends to develop a GSM protocol to control devices
remotely by sending specific SMS message from a cell phone. Project is implemented using generalpurpose 32 bit microcontroller LPC2106. This report consists of basic hardware description, projectsetup and implemented protocol.
-
8/8/2019 Full Catalogue 2005 09
27/64
Resource Centre, DA-IICT B.Tech. Projects 2009
13
Author: Garg, Sagun (200501098)Title: Robust Design for M-Banking Client Application on Mobile using Design Patterns; 9 p.; 2009.
Supervisor: Banerjee, AsimOn site
supervisor:Murthy, Siddalinga, TCS-Qualcomm
Keywords: M-Banking; Robust Design; Design patterns; Client Mobile Application Design Metrics. Abstract: M-banking is an important channel for banking services, and in emerging markets, provides some
possibility for becoming a primary channel. With mostly object oriented applications becomingsuccessful in the market it is an obvious choice for our design. There are two purposes of thisthesis. First, to look into the microarchitectures (object structures) static and dynamic relationsamong objects (and/or their classes) encountered in object-oriented development of client m-banking application. And second, to quantify the quality of de sign. Objects should communicate without becoming entangled in each other’s data models and methods. Design patterns are used tokeep classes separated and prevent them from having to know too much about one another. Loosecoupling for flexible design and encapsulation has been an objective of good object oriented design.Measuring has been the basis for science and engineering since the middle ages. Measurement isnecessary so as to improve the software design, assisting in assessing the quality of a project. Byusing design metrics, a designer can correct software defects which otherwise generally becomehuge design overheads as the project progresses.
Author: Gopi, Nitin (200501022)Title: Semantic Search Engine; 4 p.; 2009.
Supervisor: Chaudhary, SanjayKeywords: Index; Latent semantic indexing; Search engine; Singular value decomposition. Abstract: The content of the World Wide Web is useful to millions of people. The information seekers use a
search engine to begin their web activity. Users submit a query, typically a list of keywords, andreceive a list of web pages that may be relevant, typically pages that contain the keywords. Althoughthe search engines are very helpful in finding information on the Internet, they suffer from the factthat they do not know the meanings of the terms and expressions used in the Web pages and therelationships between them. The aim of this work is to show how better algorithms like LatentSemantic Indexing can be used for indexing.
Author: Gowtham Srinivas P. (200501090) and Reddy, D. Ravindra Kumar (200501094)Title: Developing Ontology for Indian Technical Institutes; 5 p.; 2009.
Supervisor: Jat, P. M.Keywords: Ontology; OWL; Semantic web; Objective – Developing ontology for Indian Technical Institutions
(Typically considering IIT’s and other premier Institutions). Abstract: In the present web, databases are made available in some form where users, application programs,
and uses are open-ended and ever changing. In this scenario we should have data along with itssemantics. For human users we can present this data with some presentation form, but forapplication programs and software agents these semantics has to be provided in machineunderstandable and processable form. The ontology includes machine-interpretable definitions ofbasic concepts in the domain and relations among them. As the research done is little to develop aknowledge base in the field of education, we choose to develop ontology for the domain Indian
Technical Institutions. It includes concepts such as Institutes, Departments, Faculty, Programs,Research Areas, and Cutoff ranks for Program.
Author: Goyal, Abhas (200501036) and Gupta , Rubish (200501070)Title: Portfolio Optimization; 6 p.; 2009.
Supervisor: Chatterji, SamareshKeywords: Optimization methods; Market optimization; Stock optimization Abstract: The purpose of the project is to study the theory presented in the paper by Thomas Rossier [1],
First, to validate the implementation of strategy on a simulated market and then apply this strategy
-
8/8/2019 Full Catalogue 2005 09
28/64
Resource Centre, DA-IICT B.Tech. Projects 2009
14
on the stocks of real Indian stock market.
Author: Goyal, Ankush (200501063) and Mishra, Abhinesh (200501155)Title: An Optimized LVQ algorithm for Multi-interval Discretization of Continuous Values; 5 p.; 2009.
Supervisor: Chaudhary, SanjayKeywords: Multi-interval discretization; Learning vector quantization; Genetic algorithm.
Abstract: Discretization of continuous valued features is an important problem to consider duringclassification learning. There already exist a number of successful discretization techniques based onLVQ algorithm. In this work, we have approached the problem of discretization from a differentangle, and have proposed an algorithm based on optimization of Learning Vector Quantization(LVQ) with Genetic Algorithm (GA). LVQ has been employed to function as a classificationalgorithm and discretization is performed using this classification nature of LVQ algorithms. Wehave modeled a GA based algorithm, which enhances the accuracy of the classifier.
Author: Goyal, Deep (200501061)Title: Ontology Matching; 10 p.; 2009.
Supervisor: Jat, P. M.Keywords: Ontology; Ontology matching; Semantic web
Abstract: In today’s world of semantic web where efforts are being made to make data over the web to bemachine processable, ontology is playing an important role. But in present scenario, severalontologies are developed by various organizations. They use their own taxonomies and vocabularies. Because of this, interoperability between ontologies is difficult and hence arises theneed of ontology matching. This project aims to demonstrate the concept of ontology matchingusing two heterogeneous ontologies.
Author: Goyal, Gourav (200501105)Title: Public-Key Cryptography Using Paraunitary Matrices over Fields of Characteristic Two; 4 p.; 2009.
Supervisor: C. Vijaykumar and Das, Manik LalKeywords: Public-Key Cryptography; Multivariate cryptography; Paraunitary Matrices; Finite-Fields. Abstract: A very important issue in the area of cryptography is to build the system faster, efficient and
secured enough. Although the RSA is secured but still it has some practical problems mainly, key-setup time and size of key. These problems can be solved by multivariate cryptography. There havebeen many schemes developed since last few years. To design a multivariate cryptosystem, Dr. F.Delgosha and Dr. F. Fekri proposed an algebraic approach which is based on formulating a generalsystem of multivariate polynomial equations by paraunitary matrices and given the name asParaunitary Asymmetric Cryptosystem (PAC). A trapdoor one-way function has been designed overthe fields of characteristic two with some approximations to paraunitary matrix. This function isused for encryption/decryption. It has been claimed that the proposed cryptosystem is securedagainst the attacks developed for Hidden Field Equations (HFE). As a conclusion, during my BTP,I have worked and understood the concepts of PAC very clearly by giving a complete analysis ofPAC.
Author: Gupta, Aakar (200501025) and Saini, Milan (200501034)Title: Formal Analysis of Hierarchical Key Assignment Schemes; 6 p.; 2009.
Supervisor: Mathuria, Anish M.Keywords: Key management schemes; Hierarchical key assignment; Diffe-hellman calss of protocol Abstract: In this work, we study the problem of formal analysis and provable security in key management
schemes, with focus on the hierarchical key assignment schemes (HKASs). We highlight theabsence and henceforth the need for a proof model in such schemes which handles their dynamicaspect. We then present a new automation tool which models an existing algebraic scheme to verifythe Diffie-Hellman class of protocols (DHCPs) and extends it for various security attributes. Weformulate the model to enable a novel approach of formal analysis of a HKAS based on the
-
8/8/2019 Full Catalogue 2005 09
29/64
Resource Centre, DA-IICT B.Tech. Projects 2009
15
DHCPs which is supported by the automation tool as well, and which considerably eases theprocess.
Author: Gupta, Abhishek (200501068)Title: Development of C Simulator for AWG based analog & digital video interface; 4 p.; 2009.
Supervisor: Dubey, Rahul
On siteSupervisors:
Sharma, Vivek Mohan and Gupta, Navneet
Keywords: Set-Top box; Arbitrary waveform generator; Flexible digital video output formatter Abstract: This report explains about the microcontroller known as Arbitrary Waveform Generator, which
enables to generate any arbitrary waveform using a very simple programming language. The Arbitrary Waveform Generator with some added hardware can be used to generate copy protectionpulses, vertical blanking and horizontal blanking pulses. One of the major applications is that itincreases the flexibility of transferring the video signal in any required standard. This report alsocontains the architecture of the C model of the applications involving Arbitrary WaveformGenerator. The C model which is actually the exact replica of the hardware helps in verification ofthe different firmwares developed for the different video standards.
Author: Gupta, Anurag (200501033)Title: Coreference Resolution using Inductive Logic Programming; 4 p.; 2009.
Supervisor: Pandya, AbhinayKeywords: Annotated corpus; Coreference resolution; Entity; General theory; Mention. Abstract: Coreference Resolution is one of the major tasks involved in understanding of human languages by
a computer. Various algorithms, models have been proposed to resolve the mentions of a particularnoun phrase in a text. Inductive Logic Programming is a new thought to address the same problemand seems to be more promising and more concrete in formal representation of a human language which can be easily understood by a computer. The project therefore aims at using Inductive LogicProgramming to generate general theory which can be used by a computer to resolve mentions ofentities in an annotated corpus.
Author: Gupta, Divyank (200501190)Title: File system for Real Time Applications with Continuous Media; 4 p.; 2009.
Supervisor: Divakaran, SrikrishnanKeywords: Admission Control; Continuous media; File system, disk layout Abstract: Continuous media services are soft real-time applications that require file system services that can
provide time guarantees. Also delivery of data should satisfy application specific quality of serviceparameters. Conventional file systems are not optimized for continuous media and do not allowclients to influence placement strategy. This project proposes a design for a file system whichattempts to provide effective admission control and file layout policy for continuous media
Author: Gupta, Amit (200501035)Title: Extending Cursor : A New Technique for Enhancing Target Acquisition; 4 p.; 2009.
Supervisor: Jotwani, Naresh D.Keywords: Fitts'law; Interaction Technique; Pointing; Target acquisition. Abstract: In this paper we present Extending cursor, a new technique for capturing targets. This technique
attempts to reduce the movement time to acquire the target by reducing the distance of movementbetween target center and cursor position. Extending cursor technique uses two cursors in whichmotion of one cursor is controlled by the other. In order to capture the target on large screens which are becoming more popular nowadays, user employ more hand work and fast mousemovements. This makes the entire pointing process cumbersome thereby making it uneasy to keeptrack on the cursor. We propose a new design to improve pointing task by making less handmovements.
-
8/8/2019 Full Catalogue 2005 09
30/64
Resource Centre, DA-IICT B.Tech. Projects 2009
16
applications. The file System metadata is modified to increase the efficiency of storage ofcontinuous media data and issues with multiple disk data management are handled.
Author: Gupta, Rohit (200501064) and Somani, Abhishek (200501077)Title: Web Service Discovery and Composition; 6 p.; 2009.
Supervisor: Chaudhary, Sanjay
Keywords: BPEL; UDDI; Web services; Web services composition. Abstract: Web service is becoming the next generation of web based application because of their accessibility
and compatibility. As the number of available Web services increases rapidly, HOW to locate thesuitable Web services is a big challenge. The process of locating or discovering of Web services isknown as Web Service Discovery. But only finding and selecting the suitable services isn't enough,composition of these services to a desired output is also a big issue. This paper provides a briefoverview of Web service technologies and focus on the Universal Description, Discovery, andIntegration (UDDI) which is a standard for publishing and discovery of Web services. Finally, thispaper will also discuss the composition mechanism for Web services using Business ProcessExecution Language (BPEL).
Author: Gupta, Sachin (200501176)
Title: Secure Data Transmission Protocol for Distributed Wireless Sensor Networks; 5 p.; 2009.Supervisor: Das, Manik LalKeywords: Pairwise key establishment; Public key cryptography; WSN security. Abstract: Wireless Sensor Networks (WSN) is a special type of networked systems characterized by severely
constrained bandwidth, computational and energy resources. WSN is gaining popularity incommercial and military environment but due to its peculiar characteristics it is prone to vulnerableattacks, thus secure data transmission is now becoming a major concern. Deriving an efficient androbust solution for key establishment, providing authorization and data confidentiality for end-to-end system has become a challenging task. This report addresses the problem of secure datatransmission in distributed WSN and also explaining the reason for reduced efficiency in existingsolutions. We propose a technique for Secure Data Transmission in Distributed Sensor network viaECC and polynomial pool based key predistribution scheme.
Author: Gupta, Shekhar (200501010)Title: A 0.7 Volt High Performance Three Stage OPAMP Using Forward Body Biased Technique; 4 p.;
2009.Supervisor: Parikh, Chetan D.Keywords: Bulk driven circuit; Depletion region; Frequency Compensation; Threshold voltage. Abstract: In this paper we have designed a very low voltage three stage operational amplifier for biomedical
instrumentation in standard 0.18µm CMOS technology, to obtain 90 dB dc gain, 20 Mhz gainbandwidth product and 470 of phase margin. The operational amplifier (OPAMP) operates at asupply voltage of 0.7 V. To make circuit stable we have applied single miller capacitance frequencycompensation technique. The high threshold voltage of MOSFET poses a major problem indesigning OPAMP at 0.7V. In order to overcome this we applied a dc voltage 0.35V at the bulk oftransistor. This reduced the threshold voltage of MOSFET. The circuit is designed with load
capacitance of 10pF.
Author: Grandhi, Ravi (200501197)Title: Crop Estimation Model: Prediction and Simulation; 4 p.; 2009.
Supervisor: Chaudhary, SanjayKeywords: Crop estimation; HPC; Agriculture. Abstract: In April 2008 the government of India imposed a ban on the rice export of the nation. During the
beginning of the year 2008 the global food market witnessed a price hike in almost all theagriculture products. The reasons for the hike are very distinct and complex. The World Banks
-
8/8/2019 Full Catalogue 2005 09
31/64
Resource Centre, DA-IICT B.Tech. Projects 2009
17
Agriculture Unit predicts that the change is weather conditions was also a reason for the pricealteration. India is predominantly an agriculture state. The fluctuations in the food price effects thelife of billions of people. Hence a model to estimate the crops is necessary to further use it topredict the prices of the crops. Since this involves heavy data crunching we need to use HighPerformance Computing.
Author: Iraveni, Ashok Kumar (200501111)Title: Algorithm for Converting SQL into Relational Algebra; 6 p.; 2009.
Supervisor: Jat, P. M.Keywords: SQL (Structured Query Language); Relational Algebra; Syntax; semantics; Relational Schema;
Relational model; Relations; Aggregate functions; Unary operator; Binary operator; Simple query;Binary query; Complex query; Group by query; Projection; Selection; Union; Intersection; CartesianProduct.
Abstract: Structured Query Language (SQL) is the dominant relational model data base language today,comprising commands to define relational algebra objects (DDL – Data Definition Language), andcommands for the data manipulation on relations (DML –Data Manipulation language). In SQLthere may be some group of queries which are syntactically different but semantics of the queries issame. But it is tough to predict which queries have same semantics from group of syntacticallydifferent queries. In this report I will explain about how to find out such queries by following the
steps of algorithm proposed by me.
Author: Jain, Amit (200501081) and Pandey, Sumit (200501104)Title: Mash-Maker: An Integrated Framework for Developing Next Generation Mashups; 7 p.; 2009.
Supervisor: Chaudhary, SanjayKeywords: Mashups; Next generation mashups; APIs; Integrated framework Abstract: The new age of the Web is defined by the socialization of content and the free availability of
information. As a part of this trend most major web application providers expose their services anddata via publically available APIs. Developers use APIs from multiple sources and remix the data toprovide the end user with a new application which has the best of many worlds. These applicationsare called Mashups. Till now, the development of Mashups involved using multiple technologiesand getting multiple data sources to work together as one. The aim of Mash-Maker is to provide the
developers with a specialized framework that would help in them focus on developing andperfecting their Mashup and also develop reusable components that they could use in futureMashups rather than work out issues posed by various languages in working with each other. Thisreport describes the proposed framework in detail.
Author: Jain, Anurag (200501027)Title: Virtual/Soft Token Based two-factor Authentication; 4 p.; 2009.
Supervisor: Das, Manik LalKeywords: Authentication; Virtual/soft token; Virtual Smart Cards; Hard token; One way hash function; one
time password (OTP). Abstract: The security vulnerabilities and thefts are increasing nowadays that represents the weakness of static
password based authentication system. This causes the significant financial/brand loss to enterprise
and highlighting the fact that more robust, secure, multifactor dynamic authentication system isrequired. I think that Two factor authentication using Hard tokens (Hardware Electronic Device),and Soft token are next generation methods providing strong authentication using one timepassword system. In this work we discuss the different authentication schemes with their positiveand negative points and finally discussed on Soft token based two-factor authentication.
-
8/8/2019 Full Catalogue 2005 09
32/64
Resource Centre, DA-IICT B.Tech. Projects 2009
18
Author: Jain, Anurag (200501050)Title: DDR2 SDRAM Model Verification Using Palladium and Axis; 4 p.; 2009.
Supervisor: Mandal, SushantaOn Site
Supervisor:Gupta, Piyush
Keywords: DDR2 SDRAM; Emulator platform; Palladium; Verification plan. Abstract: Memories have been an essential component of various digital designs. New and improved memory
models are continuously being introduced in the market. Currently the most used and trustedmemory used is Double Data Rate2 Synchronous Dynamic Random Access Memory (DDR2SDRAM). In order to verify a design it needs to be tested with an original DDR2 SDRAM. A highamount of fee is paid to memory vendors to lease a memory module. ST Microelectronicsdeveloped a memory module of its own to verify designs on emulator platforms. This project is to verify this new memory module against established DDR2 SDRAM. Since this module is to be usedfor two technologies, simulation acceleration and emulation, as a part of this project I implementedthe module with two tools. A comprehensive study and a comparative study of the two differenttechnologies are also presented in this report.
Author: Jain, Chaitanya (200501041)Title: Dynamic Time Warping Based Approach to Dialect Recognition in Indian English; 4 p.; 2009.
Supervisor: Sarkar, Aditi Nath and Patil, HemantKeywords: Linguistics; MFCC; DTW. Abstract: Speech has evolved as the primary medium of communication among humans. But some intricacies
distinguish one regional speaker from another. Such distinctions mark out the speech forms of onegroup from another group as a ‘language’, and of a sub-group as a ‘dialect’. These styles makespeech, region and group specific. The differences still persist even if the speakers from differentregions speak in a foreign tongue, native to none of them.
This project is aimed at analyzing how, in India, various regional speakers who are speakers ofdifferent languages as their ‘native’ language, differ from each other with respect to theirpronunciation of English. A Dynamic Time Warping based approach has been developed for adialect recognition system for Indian English.
Author: Jain, Manish (200501023)Title: Porting Free RTOS on Wild Cense; 6 p.; 2009.
Supervisor: Ranjan, PrabhatKeywords: Real time operating system; Wild cense; FreeRTOS; Real time. Abstract: WildCense is a wireless sensor network for studying behavior and movement patterns of wild
animals. It also gathers microclimatic and positional information of the animals. The whole systemis designed as a network of several nodes. Along with communication with various hardware units, WildCense has to follow some timing constraints for completing its objectives. Achieving theseobjectives becomes more difficult when sequential programming is used for implementing thesystem. Therefore, keeping these requirements into consideration, aim of this project is to portFreeRTOS, a real-time operating system on WildCense for bringing multitasking into the systemand fulfilling all timing constraints besides keeping the system simple and reliable. This report looks
into the workflow and architecture of WildCense with FreeRTOS.
Author: Jain, Mohit (200501088)Title: Is the Attack Valid? A Tool for Detecting Erroneous Attacks Found by Scyther; 5 p.; 2009.
Supervisor: Mathuria, Anish M.Keywords: Autonomic Framework; Formal Analysis; Attack Validation; Security Protocols. Abstract: Formal methods have been used for the analysis of security protocols and for detection of flaws in
them. However, a number of false attacks have been reported in literature. This is a serious problemas good protocols might be rejected because of false attacks. In an autonomic framework, attacks
-
8/8/2019 Full Catalogue 2005 09
33/64
Resource Centre, DA-IICT B.Tech. Projects 2009
19
found by automated model checkers needs to be validated, as literature reports model checkersproducing false attacks. The two categories of false attacks reported by the model checker Scytherare Sender’s Incomplete Knowledge Error (SIKE) and Ticket Attacks. In recent research, AndersHagalisletto proposed formal methods and developed a tool to validate attacks on protocols, butthe tool is not publicly available. In this paper, we propose novel formal approaches to detect falseattacks on security protocols under SIKE and Ticket Attack categories. We also developed a tool,SPAA (Security Protocols A