ebook img

Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 2 PDF

525 Pages·2015·14.199 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 2

Advances in Intelligent Systems and Computing 309 Lakhmi C. Jain Srikanta Patnaik Nikhil Ichalkaranje E ditors Intelligent Computing, Communication and Devices Proceedings of ICCD 2014, Volume 2 Advances in Intelligent Systems and Computing Volume 309 Series editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland e-mail: [email protected] About this Series The series ‘‘Advances in Intelligent Systems and Computing’’ contains publications on theory,applications,anddesignmethodsofIntelligentSystemsandIntelligentComputing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered.Thelistoftopicsspansalltheareasofmodernintelligentsystemsandcomputing. The publications within ‘‘Advances in Intelligent Systems and Computing’’ are primarily textbooksandproceedingsofimportantconferences,symposiaandcongresses.Theycover significantrecentdevelopmentsinthefield,bothofafoundationalandapplicablecharacter. Animportantcharacteristicfeatureoftheseriesistheshortpublicationtimeandworld-wide distribution. Thispermits arapid and broaddissemination of research results. Advisory Board Chairman Nikhil R. Pal, Indian Statistical Institute, Kolkata, India e-mail: [email protected] Members RafaelBello,UniversidadCentral‘‘MartaAbreu’’deLasVillas,SantaClara,Cuba e-mail: [email protected] Emilio S. Corchado, University of Salamanca, Salamanca, Spain e-mail: [email protected] Hani Hagras, University of Essex, Colchester, UK e-mail: [email protected] László T. Kóczy, Széchenyi István University, Gy}or, Hungary e-mail: [email protected] Vladik Kreinovich, University of Texas at El Paso, El Paso, USA e-mail: [email protected] Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan e-mail: [email protected] Jie Lu, University of Technology, Sydney, Australia e-mail: [email protected] Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico e-mail: [email protected] Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil e-mail: [email protected] Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland e-mail: [email protected] Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong e-mail: [email protected] More information about this series at http://www.springer.com/series/11156 Lakhmi C. Jain Srikanta Patnaik • Nikhil Ichalkaranje Editors Intelligent Computing, Communication and Devices Proceedings of ICCD 2014, Volume 2 123 Editors Lakhmi C. Jain SrikantaPatnaik Faculty ofEducation, Science,Technology Department of Computer Scienceand andMathematics Engineering Universityof Canberra SOAUniversity Canberra, ACT Bhubaneswar, Odisha Australia India and Nikhil Ichalkaranje Department of Premier andCabinet Universityof South Australia Office of theChiefInformationOfficer MawsonLakes, SA Adelaide,SA Australia Australia ISSN 2194-5357 ISSN 2194-5365 (electronic) ISBN 978-81-322-2008-4 ISBN 978-81-322-2009-1 (eBook) DOI 10.1007/978-81-322-2009-1 LibraryofCongressControlNumber:2014944718 SpringerNewDelhiHeidelbergNewYorkDordrechtLondon (cid:2)SpringerIndia2015 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionor informationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purposeofbeingenteredandexecutedonacomputersystem,forexclusiveusebythepurchaserofthe work. Duplication of this publication or parts thereof is permitted only under the provisions of theCopyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the CopyrightClearanceCenter.ViolationsareliabletoprosecutionundertherespectiveCopyrightLaw. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexempt fromtherelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. While the advice and information in this book are believed to be true and accurate at the date of publication,neithertheauthorsnortheeditorsnorthepublishercanacceptanylegalresponsibilityfor anyerrorsoromissionsthatmaybemade.Thepublishermakesnowarranty,expressorimplied,with respecttothematerialcontainedherein. Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Preface The Organizing Committee is delighted to present the high-quality papers presented in the first International Conference on Intelligent Computing, Communication and Devices (ICCD 2014) being organized by SOA University during April 18–19, 2014. The title was chosen as this converges three upcoming technologies for the next decade. In recent time, ‘‘Intelligence’’ is the buzz word for any discipline and many scholars are working in these areas. In simple definition, ‘‘intelligence’’ is the ability to think and learn. Looking back to its origin and development, report says, since 1956 artificial intelligence was formally found and has enjoyed tremendous success over the past 60 years. During the 1960s, the subject was dominated by traditional artificial intelligence that follows the principle of physical symbolic system hypothesis to get great success,particularlyinknowledgeengineering.Duringthe1980s,Japanproposed the fifth generation computer system (FGCS), which is knowledge information processingformingthemainpartofappliedartificialintelligence.Duringthenext two decades, the key technologies for the FGCS was developed such as VLSI architecture, parallel processing, logic programming, knowledge base system, applied artificial intelligence and pattern processing, etc. The last decade is observingtheachievementsofintelligenceinthemainstreamofcomputerscience and at the core of some systems such as Communication, Devices, Embedded Systems, Natural Language Processor, and many more. ICCD 2014 covers all dimensions of intelligent sciences in its three tracks, namely Intelligent Computing, Intelligent Communication, and Intelligent Devices. Intelligent Computing track covers areas such as Intelligent and DistributedComputing,IntelligentGridandCloudComputing,InternetofThings, Soft Computing and Engineering Applications, Data Mining and Knowledge Discovery, Semantic and Web Technology, Hybrid Systems, Agent Computing, Bio-Informatics, and Recommendation Systems. At the same time, Intelligent Communication covers communications and networks technologies, including mobile broadband and all optical networks, which are the key to the groundbreaking inventions to intelligent communication technologies. This covers Communication Hardware, Software and Networked v vi Preface Intelligence, Mobile Technologies, Machine-to-Machine Communication Networks, Speech and Natural Language Processing, Routing Techniques and NetworkAnalytics,WirelessAdHocandSensorNetworks,Communicationsand InformationSecurity,Signal,ImageandVideoProcessing,NetworkManagement and Traffic Engineering. The Intelligent Device is any type of equipment, instrument, or machine that has its own computing capability. As computing technology becomes more advanced and less expensive, it can be builtinto an increasingnumber of devices of all kinds. The Intelligent Device covers areas such as Embedded Systems, RFID, RF MEMS, VLSI Design and Electronic Devices, Analog and Mixed- Signal IC Design and Testing, MEMS and Microsystems, Solar Cells and Pho- tonics,Nano-Devices,SingleElectronandSpintronicsDevices,SpaceElectronics, and Intelligent Robotics. The ‘‘Call for Paper’’ for this conference was announced in the first week of January2014andduetoshortageoftimewehavetokeepaverytightdeadlinefor papersubmission,i.e.,March15.Buttooursurprise,wehavereceived324papers, whichwereconsideredforreviewandediting.Outofthese324papers,163papers were accepted for the presentation and publication whereas 147 papers were registered, which are covered in this proceeding. Iamsuretheparticipantsmusthavesharedagoodamountofknowledgeduring the two days of this conference. I wish all success in their academic endeavor. Srikanta Patnaik Contents A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . 1 Mukesh Kumar and Kamlesh Dutta Secure and Dynamic IP Address Configuration Scheme in MANET. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Poulami Choudhury, Koushik Majumder and Debashis De A Novel Distributed Dynamic IP Configuration Scheme for MANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Pritam Bag, Koushik Majumder and Debashis De Dual Security Against Grayhole Attack in MANETs. . . . . . . . . . . . . . 33 Ankit D. Patel and Kartik Chawda I-EDRI Scheme to Mitigate Grayhole Attack in MANETs . . . . . . . . . 39 Ankit D. Patel, Rutvij H. Jhaveri and Shaishav N. Shah Frequency Domain Incremental Strategies Over Distributed Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Siba Prasad Mishra and Ajit Kumar Sahoo Modeling and Analysis of Cross-Layer Uplink Scheduler in IEEE 802.16e Standard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 M. Vijayalaxmi, Swaroop R. Puranik and Linganagouda Kulkarni A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network. . . . . . . . . . . . . 65 Sonali Swetapadma Sahu and Manjusha Pandey vii viii Contents Location-Based Coordinated Routing Protocol for Wireless Sensor and Actor Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Biswa Mohan Acharya and S.V. Rao Energy Saving Performance Analysis of Hierarchical Data Aggregation Protocols Used in Wireless Sensor Network . . . . . . . . . . 79 Bhagwat Prasad Chaudhury and Ajit Kumar Nayak Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCF Under Same Type of Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Rameswari Biswal and D. Seth A Distributed Prime Node-ID Connected Dominating Set for Target Coverage Using Adjustable Sensing Range . . . . . . . . . . . . 99 Anita Chandra, Nachiketa Tarasia, Amulya Ratan Swain and Manish Kumar Token Based Group Local Mutual Exclusion Algorithm in MANETs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Ashish Khanna, Awadhesh Kumar Singh and Abhishek Swaroop A Distributed Secured Localization Scheme for Wireless Sensor Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Lakshmana Phaneendra Maguluri, Shaik Mahaboob Basha, S. Ramesh and Md Amanatulla Characteristic Function for Variable-Bit-Rate Multimedia QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Neela Rakesh and Hemanta Kumar Pati A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Manoj Kumar and I. Praveen Query by Humming System Through Multiscale Music Entropy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Trisiladevi C. Nagavi and Nagappa U. Bhajantri An Empirical Analysis of Training Algorithms of Neural Networks: A Case Study of EEG Signal Classification Using Java Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 Sandeep Kumar Satapathy, Alok Kumar Jagadev and Satchidananda Dehuri Contents ix Relating Perceptual Feature Space and Context Drift Information in Query by Humming System . . . . . . . . . . . . . . . . . . . . 161 Trisiladevi C. Nagavi and Nagappa U. Bhajantri First-Fit Semi-partitioned Scheduling Based on Rate Monotonic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Saeed Senobary and Mahmoud Naghibzadeh A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks . . . . . . . . . . . . . . . . . . . . . . . . . 183 Savita Badhan and Mamta Juneja A Comparative Study of Correlation Based Stereo Matching Algorithms: Illumination and Exposure . . . . . . . . . . . . . . . . . . . . . . . 191 N.S. Bindu and H.S. Sheshadri A Hybrid Motion Based-Object Tracking Algorithm for VTS. . . . . . . 203 Prasenjit Das and Nirmalya Kar Side Lobe Level and Null Control Design of Linear Antenna Array Using Taguchi’s Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Rakesh Kumar, Saumendra Ku. Mohanty and B.B. Mangaraj A Novel Approach for Jamming and Tracking of Mobile Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Aradhana Misra, Nirmal Kumar Rout and Kaustav Dash Performance Analysis of Low-Complexity Multiuser STBC MC-CDMA System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Sadananda Behera and Sarat Kumar Patra On the Design an Enhanced Bandwidth of Elliptical Shape CPW-Fed Fractal Monopole Antenna for UWB Application. . . . . . . . 229 Satyabrata Maiti, Naikatmana Pani, Thiyam Romila Devi and Amlan Datta Design of Microstrip Branch Line Coupler Phase Shifter in L-Band . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Thiyam Romila Devi, Satyabrata Maiti, Abhishek Jena and Amlan Datta

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.