communications in computer and information science …978-3-642-22714-1/1advances in computing and...
TRANSCRIPT
Communicationsin Computer and Information Science 191
Ajith Abraham Jaime Lloret MauriJohn F. Buford Junichi SuzukiSabu M. Thampi (Eds.)
Advances in Computingand Communications
First International Conference, ACC 2011Kochi, India, July 22-24, 2011Proceedings, Part II
13
Volume Editors
Ajith AbrahamMachine Intelligence Research Labs (MIR Labs)Auburn, WA, USAE-mail: [email protected]
Jaime Lloret MauriPolytechnic University of ValenciaValencia, SpainE-mail: [email protected]
John F. BufordAvaya Labs ResearchBasking Ridge, NJ, USAE-mail: [email protected]
Junichi SuzukiUniversity of MassachusettsBoston, MA, USAE-mail: [email protected]
Sabu M. ThampiRajagiri School of Engineering and TechnologyKochi, IndiaE-mail: [email protected]
ISSN 1865-0929 e-ISSN 1865-0937ISBN 978-3-642-22713-4 e-ISBN 978-3-642-22714-1DOI 10.1007/978-3-642-22714-1Springer Heidelberg Dordrecht London New York
Library of Congress Control Number: Applied for
CR Subject Classification (1998): I.2, C.2, H.3, H.4, K.6.5, J.1
© Springer-Verlag Berlin Heidelberg 2011This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply,even in the absence of a specific statement, that such names are exempt from the relevant protective lawsand regulations and therefore free for general use.
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Preface
The First International Conference on Advances in Computing and Communi-cations (ACC 2011) was held in Kochi during July 22–24, 2011. ACC 2011 wasorganized by Rajagiri School of Engineering & Technology (RSET) in associa-tion with the Association of Computing Machinery (ACM)- SIGWEB, MachineIntelligence Research Labs (MIR Labs), International Society for Computersand Their Applications, Inc. (ISCA), All India Council for Technical Educa-tion (AICTE), Indira Gandhi National Open University (IGNOU), Kerala StateCouncil for Science, Technology and Environment (KSCSTE), Computer Soci-ety of India (CSI)- Div IV and Cochin Chapter, The Institution of Electronicsand Telecommunication Engineers (IETE), The Institution of Engineers (India)and Project Management Institute (PMI),Trivandrum, Kerala Chapter. Estab-lished in 2001, RSET is a premier professional institution striving for holisticexcellence in education to mould young, vibrant engineers.
ACC 2011 was a three-day conference which provided an opportunity tobring together students, researchers and practitioners from both academia andindustry. ACC 2011 was focused on advances in computing and communicationsand it attracted many local and international delegates, presenting a balancedmixture of intellects from the East and from the West. ACC 2011 received 592 re-search papers from 38 countries including Albania, Algeria, Bangladesh, Brazil,Canada, Colombia, Cyprus, Czech Republic, Denmark, Ecuador, Egypt, France,Germany, India, Indonesia, Iran, Ireland, Italy, Korea, Kuwait, Malaysia, Mo-rocco, New Zealand, P.R. China, Pakistan, Rwanda, Saudi Arabia, Singapore,South Africa, Spain, Sri Lanka, Sweden, Taiwan, The Netherlands, Tunisia, UK,and USA. This clearly reflects the truly international stature of ACC 2011. Allpapers were rigorously reviewed internationally by an expert technical reviewcommittee comprising more than 300 members. The conference had a peer-reviewed program of technical sessions, workshops, tutorials, and demonstrationsessions.
There were several people that deserve appreciation and gratitude for helpingin the realization of this conference. We would like to thank the Program Com-mittee members and additional reviewers for their hard work in reviewing paperscarefully and rigorously. After careful discussions, the Program Committee se-lected 234 papers (acceptance rate: 39.53%) for presentation at the conference.We would also like to thank the authors for having revised their papers to addressthe comments and suggestions by the referees.
The conference program was enriched by the outstanding invited talks byAjith Abraham, Subir Saha, Narayan C. Debnath, Abhijit Mitra, K. ChandraSekaran, K. Subramanian, Sudip Misra, K.R. Srivathsan, Jaydip Sen, JoyatiDebnath and Junichi Suzuki. We believe that ACC 2011 delivered a high-quality,stimulating and enlightening technical program. The tutorials covered topics of
VI Preface
great interest to the cyber forensics and cloud computing communities. The tu-torial by Avinash Srinivasan provided an overview of the forensically importantartifacts left behind on a MAC computer. In his tutorial on “Network Foren-sics,” Bhadran provided an introduction to network forensics, packet captureand analysis techniques, and a discussion on various RNA tools. The tutorial onNext-Generation Cloud Computing by Pethuru Raj focused on enabling tech-nologies in cloud computing.
The ACC 2011 conference program also included five workshops: Interna-tional Workshop on Multimedia Streaming (MultiStreams 2011), Second Inter-national Workshop on Trust Management in P2P Systems (IWTMP2PS 2011),International Workshop on Cloud Computing: Architecture, Algorithms andApplications (CloudComp 2011), International Workshop on Identity: Security,Management and Applications (ID2011) and International Workshop on Appli-cations of Signal Processing (I-WASP 2011). We thank all the workshop organiz-ers as well as the Workshop Chair, El-Sayed El-Alfy, for their accomplishmentto bring out prosperous workshops. We would like to express our gratitude tothe Tutorial Chairs Patrick Seeling, Jaydeep Sen, K.S. Mathew, and RoksanaBoreli and Demo Chairs Amitava Mukherjee, Bhadran V.K., and JanardhananP.S. for their timely expertise in reviewing the proposals. Moreover, we thankPublication Chairs Pruet Boonma, Sajid Hussain and Hiroshi Wada for theirkind help in editing the proceedings. The large participation in ACC2011 wouldnot have been possible without the Publicity Co-chairs Victor Govindaswamy,Arun Saha and Biju Paul.
The proceedings of ACC 2011 are organized into four volumes. We hopethat you will find these proceedings to be a valuable resource in your profes-sional, research, and educational activities whether you are a student, academic,researcher, or a practicing professional.
July 2011 Ajith AbrahamJaime Lloret Mauri
John F. BufordJunichi Suzuki
Sabu M. Thampi
Organization
ACC 2011 was jointly organized by the Department of Computer Scienceand Engineering and Department of Information Technology, Rajagiri Schoolof Engineering and Technology (RSET), Kochi, India, in cooperation withACM/SIGWEB.
Organizing Committee
Chief PatronsFr. Jose Alex CMI Manager, RSETFr. Antony Kariyil CMI Director, RSET
Patron
J. Isaac, Principal RSET
Advisory Committee
A. Krishna Menon RSETA.C. Mathai RSETFr. Varghese Panthalookaran RSETKarthikeyan Chittayil RSETVinod Kumar, P.B. RSETBiju Abraham
Narayamparambil RSETKuttyamma A.J. RSETAsha Panicker RSETK. Rajendra Varmah RSETP.R. Madhava Panicker RSETLiza Annie Joseph RSETVarkey Philip RSETFr. Joel George Pullolil RSETR. Ajayakumar Varma KSCSTEK. Poulose Jacob Cochin University of Science & TechnologyH.R. Mohan, Chairman Div IV, Computer Society of India (CSI)Soman S.P., Chairman Computer Society of India (CSI), Cochin
ChapterS. Radhakrishnan, Chairman Kerala State Centre, The Institution of
Engineers (India)
VIII Organization
Steering Committee
John F. Buford Avaya Labs Research, USARajkumar Buyya University of Melbourne, AustraliaMukesh Singhai University of Kentucky, USAJohn Strassner Pohang University of Science and Technology,
Republic of KoreaJunichi Suzuki University of Massachusetts, Boston, USARamakrishna Kappagantu IEEE India CouncilAchuthsankar S. Nair Centre for Bioinformatics, Trivandrum, India
Conference Chair
Sabu M. Thampi Rajagiri School of Engineering and Technology,India
ACC 2011 Program Committee Chairs
General Co-chairsAjith Abraham Machine Intelligence Research Labs, EuropeChandra Sekaran K. National Institute of Technology Karnataka,
IndiaWaleed W. Smari University of Dayton, Ohio, USA
Program Co-chairs
Jaime Lloret Mauri Polytechnic University of Valencia, SpainThorsten Strufe Darmstadt University of Technology, GermanyGregorio Martinez University of Murcia, Spain
Special Sessions and Workshops Co-chairs
El-Sayed El-Alfy King Fahd University of Petroleum andMinerals, Saudi Arabia
Silvio Bortoleto Positivo University, Brazil
Tutorial Co-chairsPatrick Seeling University of Wisconsin - Stevens Point, USAJaydeep Sen Tata Consultancy Services, Calcutta, IndiaK.S. Mathew Rajagiri School of Engineering and Technology,
IndiaRoksana Boreli National ICT Australia Ltd., Australia
Organization IX
Demo Co-chairsAmitava Mukherjee IBM Global Business Services, IndiaBhadran V.K. Centre for Development of Advanced
Computing, Trivandrum, IndiaJanardhanan P.S. Rajagiri School of Engineering and Technology,
India
Publicity Co-chairs
Victor Govindaswamy Texas A&M University, USAArun Saha Fujitsu Network Communications, USABiju Paul Rajagiri School of Engineering and Technology,
India
Publication Co-chairsPruet Boonma Chiang Mai University, ThailandSajid Hussain Fisk University, USAHiroshi Wada University of New South Wales, Australia
ACC 2011 Technical Program Committee
A. Hafid Network Research Lab, University of Montreal,Canada
Abdallah Shami The University of Western Ontario, CanadaAbdelhafid Abouaissa University of Haute Alsace, FranceAbdelmalik Bachir Imperial College London, UKAbdelouahid Derhab CERIST, AlgeriaAbhijit Mitra Indian Institute of Technology Guwahati, IndiaAdao Silva University of Aveiro, PortugalAdel Ali University Technology MalaysiaAhmed Mehaoua University of Paris Descartes, FranceAi-Chun Pang National Taiwan University, TaiwanAjay Gupta Western Michigan University, USAAlberto Dainotti University of Naples “Federico II”, ItalyAlessandro Leonardi University of Catania, ItalyAlex Galis University College London, UKAlexey Vinel Saint Petersburg Institute, RussiaAli Abedi University of Maine, USAAlicia Trivino Cabrera Universidad de Malaga, SpainAlireza Behbahani University of California, Irvine, USAAlois Ferscha University of Linz, AustriaAl-Sakib Khan Pathan International Islamic University, MalaysiaAmar Prakash Azad INRIA, FranceAmirhossein Alimohammad University of Alberta, CanadaAmit Agarwal Indian Institute of Technology, Roorkee, India
X Organization
Amitava Mukherjee IBM Global Business Services, IndiaAnand Prasad NEC Corporation, JapanAndreas Maeder NEC Laboratories Europe, GermanyAnkur Gupta Model Institute of Engineering and Technology,
IndiaAntonio Coronato ICAR-CNR, Naples, ItalyAntonio Pescape University of Naples Federico II, ItalyAntonio Rodrigues IT / Instituto Superior Tecnico, PortugalAnura P. Jayasumana Colorado State University, USAArnab Bhattacharya Indian Institute of Technology, Kanpur, IndiaArun Saha Fujitsu Network Communications, USAArvind Swaminathan Qualcomm, USAAshley Thomas Secureworks Inc., USAAshraf Elnagar Sharjah University, UAEAshraf Mahmoud KFUPM, Saudi ArabiaAshwani Singh Navtel Systems, FranceAthanasios Vasilakos University of Western Macedonia, GreeceAtilio Gameiro Telecommunications Institute/Aveiro
University, PortugalAydin Sezgin Ulm University, GermanyAyman Assra McGill University, CanadaAytac Azgin Georgia Institute of Technology, USAB. Sundar Rajan Indian Institute of Science, IndiaBabu A.V. National Institute of Technology, Calicut, IndiaBabu B.V. BITS-Pilani, Rajasthan, IndiaBabu Raj E. Sun College of Engineering and Technology,
IndiaBalagangadhar G. Bathula Columbia University, USABorhanuddin Mohd. Ali Universiti Putra MalaysiaBrijendra Kumar Joshi Military College, Indore, IndiaBruno Crispo Universita di Trento, ItalyC.-F. Cheng National Chiao Tung University, TaiwanChang Wu Yu Chung Hua University, TaiwanCharalampos Tsimenidis Newcastle University, UKChih-Cheng Tseng National Ilan University, TaiwanChi-Hsiang Yeh Queen’s University, CanadaChitra Babu SSN College of Engineering, Chennai, IndiaChittaranjan Hota BITS Hyderabad Campus, IndiaChonho Lee Nanyang Technological University, SingaporeChristian Callegari University of Pisa, ItalyChristos Chrysoulas Technological Educational Institute, GreeceChuan-Ching Sue National Cheng Kung University, TaiwanChung Shue Chen TREC, INRIA, France
Organization XI
Chun-I. Fan National Sun Yat-sen University, TaiwanChutima Prommak Suranaree University of Technology, ThailandDali Wei Jiangsu Tianze Infoindustry Company Ltd,
P.R. ChinaDanda B. Rawat Old Dominion University, USADaniele Tarchi University of Bologna, ItalyDavide Adami CNIT Pisa Research Unit, University of Pisa,
ItalyDeepak Garg Thapar University, IndiaDemin Wang Microsoft Inc., USADennis Pfisterer University of Lubeck, GermanyDeyun Gao Beijing Jiaotong University, P.R. ChinaDharma Agrawal University of Cincinnati, USADhiman Barman Juniper Networks, USADi Jin General Motors, USADimitrios Katsaros University of Thessaly, GreeceDimitrios Vergados National Technical University of Athens,
GreeceDirk Pesch Cork Institute of Technology, IrelandDjamel Sadok Federal University of Pernambuco, BrazilEduardo Cerqueira Federal University of Para (UFPA), BrazilEduardo Souto Federal University of Amazonas, BrazilEdward Au Huawei Technologies, P.R. ChinaEgemen Cetinkaya University of Kansas, USAElizabeth Sherly IIITM-Kerala, IndiaEl-Sayed El-Alfy King Fahd University, Saudi ArabiaEmad A. Felemban Umm Al Qura University, Saudi ArabiaEric Renault TELECOM & Management SudParis, FranceErrol Lloyd University of Delaware, USAErtan Onur Delft University of Technology,
The NetherlandsFaouzi Bader CTTC, SpainFaouzi Kamoun WTS, UAEFernando Velez University of Beira Interior, PortugalFilipe Cardoso ESTSetubal/Polytechnic Institute of Setubal,
PortugalFlorian Doetzer ASKON ConsultingGroup, GermanyFrancesco Quaglia Sapienza Universita di Roma, ItalyFrancine Krief University of Bordeaux, FranceFrank Yeong-Sung Lin National Taiwan University, TaiwanGianluigi Ferrari University of Parma, ItalyGiuseppe Ruggeri University “Mediterranea” of Reggio Calabria,
ItalyGrzegorz Danilewicz Poznan University of Technology, PolandGuang-Hua Yang The University of Hong Kong, Hong KongGuo Bin Institut Telecom SudParis, France
XII Organization
Hadi Otrok Khalifa University, UAEHamid Mcheick Universite du Quebec a Chicoutimi, CanadaHarry Skianis University of the Aegean, GreeceHicham Khalife ENSEIRB-LaBRI, FranceHimal Suraweera Singapore University of Technology and Design,
SingaporeHiroshi Wada University of New South Wales, AustraliaHong-Hsu Yen Shih-Hsin University, TaiwanHongli Xu University of Science and Technology of China,
P.R. ChinaHoucine Hassan Technical University of Valencia, SpainHsuan-Jung Su National Taiwan University, TaiwanHuaiyu Dai NC State University, USAHuey-Ing Liu Fu-Jen Catholic University, TaiwanHung-Keng Pung National University of SingaporeHung-Yu Wei NTU, TaiwanIan Glover University of Strathclyde, UKIan Wells Swansea Metropolitan University, UKIbrahim Develi Erciyes University, TurkeyIbrahim El rube AAST, EgyptIbrahim Habib City University of New York, USAIbrahim Korpeoglu Bilkent University, TurkeyIlja Radusch Technische Universitat Berlin, GermanyIlka Miloucheva Media Technology Research, GermanyImad Elhajj American University of Beirut, LebanonIvan Ganchev University of Limerick, IrelandIwan Adhicandra The University of Pisa, ItalyJalel Ben-othman University of Versailles, FranceJane-Hwa Huang National Chi Nan University, TaiwanJaydeep Sen Tata Consultancy Services, Calcutta, IndiaJiankun Hu RMIT University, AustraliaJie Yang Cisco Systems, USAJiping Xiong Zhejiang Normal University of ChinaJose de Souza Federal University of Ceara, BrazilJose Moreira IBM T.J. Watson Research Center, USAJu Wang Virginia State University, USAJuan-Carlos Cano Technical University of Valencia, SpainJudith Kelner Federal University of Pernambuco, BrazilJulien Laganier Juniper Networks Inc., USAJussi Haapola University of Oulu, FinlandK. Komathy Easwari Engineering College, Chennai, IndiaKa Lok Hung The Hong Kong University, Hong KongKa Lok Man Xi’an Jiaotong-Liverpool University, ChinaKaddar Lamia University of Versailles Saint Quentin, FranceKainam Thomas Hong Kong Polytechnic University
Organization XIII
Kais Mnif High Institute of Electronics andCommunications of Sfax, Tunisia
Kang Yong Lee ETRI, KoreaKatia Bortoleto Positivo University, BrazilKejie Lu University of Puerto Rico at Mayaguez, USAKemal Tepe University of Windsor, CanadaKhalifa Hettak Communications Research Centre (CRC),
CanadaKhushboo Shah Altusystems Corp, USAKotecha K. Institute of Technology, Nirma University, IndiaKpatcha Bayarou Fraunhofer Institute, GermanyKumar Padmanabh General Motors, IndiaKyriakos Manousakis Telcordia Technologies, USAKyung Sup Kwak Inha University, KoreaLi Zhao Microsoft Corporation, USALi-Chun Wang National Chiao Tung University, TaiwanLin Du Technicolor Research and Innovation Beijing,
P.R. ChinaLiza A. Latiff University Technology MalaysiaLuca Scalia University of Palermo, ItalyM Ayoub Khan C-DAC, Noida, IndiaMaaruf Ali Oxford Brookes University, UKMadhu Kumar S.D. National Institute of Technology, Calicut, IndiaMadhu Nair University of Kerala, IndiaMadhumita Chatterjee Indian Institute of Technology Bombay, IndiaMahamod Ismail Universiti Kebangsaan MalaysiaMahmoud Al-Qutayri Khalifa University, UAEManimaran Govindarasu Iowa State University, USAMarcelo Segatto Federal University of Espırito Santo, FranceMaria Ganzha University of Gdansk, PolandMarilia Curado University of Coimbra, PortugalMario Fanelli DEIS, University of Bologna,ItalyMariofanna Milanova University of Arkansas at Little Rock, USAMariusz Glabowski Poznan University of Technology, PolandMariusz Zal Poznan University of Technology, PolandMasato Saito University of the Ryukyus, JapanMassimiliano Comisso University of Trieste, ItalyMassimiliano Laddomada Texas A&M University-Texarkana, USAMatthias R. Brust University of Central Florida, USAMehrzad Biguesh Queen’s University, CanadaMichael Alexander Scaledinfra Technologies GmbH, AustriaMichael Hempel University of Nebraska - Lincoln, USAMichael Lauer Vanille-Media, GermanyMing Xia NICT, JapanMing Xiao Royal Institute of Technology, SwedenMohamed Ali Kaafar INRIA, France
XIV Organization
Mohamed Cheriet Ecole de Technologie Superieure, CanadaMohamed Eltoweissy Pacific Northwest National Laboratory, USAMohamed Hamdi Carthage University, TunisiaMohamed Moustafa Akhbar El Yom Academy, EgyptMohammad Banat Jordan University of Science and Technology,
JordanMohammad Hayajneh UAEU, UAEMohammed Misbahuddin C-DAC, IndiaMustafa Badaroglu IMEC, BelgiumNaceur Malouch Universite Pierre et Marie Curie, FranceNakjung Choi, Alcatel-Lucent Bell-Labs, Seoul, KoreaNamje Park Jeju University, South KoreaNatarajan Meghanathan Jackson State University, USANeeli Prasad Center for TeleInFrastructure (CTIF),
DenmarkNen-Fu Huang National Tsing Hua University, TaiwanNikola Zogovic University of Belgrade, SerbiaNikolaos Pantazis Technological Educational Institution of
Athens, GreeceNilanjan Banerjee IBM Research, IndiaNiloy Ganguly Indian Institute of Technology, Kharagpur,
IndiaPablo Corral Gonzalez University Miguel Hernandez, SpainPatrick Seeling University of Wisconsin - Stevens Point, USAPaulo R.L. Gondim University of Brasılia, BrazilPeter Bertok Royal Melbourne Institute of Technology
(RMIT), AustraliaPhan Cong-Vinh London South Bank University, UKPingyi Fan Tsinghua University, P.R. ChinaPiotr Zwierzykowski Poznan University of Technology, PolandPascal Lorenz University of Haute Alsace, FrancePruet Boonma Chiang Mai University, ThailandPunam Bedi University of Delhi, IndiaQinghai Gao Atheros Communications Inc., USARahul Khanna Intel, USARajendra Akerkar Western Norway Research Institute, NorwayRaul Santos University of Colima, MexicoRavishankar Iyer Intel Corp, USARegina Araujo Federal University of Sao Carlos, BrazilRenjie Huang Washington State University, USARicardo Lent Imperial College London, UKRio G. L. D’Souza St. Joseph Engineering College, Mangalore,
IndiaRoberto Pagliari University of California, Irvine, USARoberto Verdone WiLab, University of Bologna, ItalyRoksana Boreli National ICT Australia Ltd., Australia
Organization XV
Ronny Yongho Kim Kyungil University, KoreaRuay-Shiung Chang National Dong Hwa University, TaiwanRuidong Li NICT, JapanS. Ali Ghorashi Shahid Beheshti University, IranSahar Ghazal University of Versailles, FranceSaid Soulhi Ericsson, SwedanSajid Hussain Fisk University, USASalah Bourennane Ecole Centrale Marseille, FranceSalman Abdul Moiz CDAC, Bangalore, IndiaSameh Elnikety Microsoft Research, USASanjay H.A. Nitte Meenakshi Institute, Bangalore, IndiaSathish Rajasekhar RMIT University, AustraliaSergey Andreev Tampere University of Technology, FinlandSeshan Srirangarajan Nanyang Technological University, SingaporeSeyed (Reza) Zekavat Michigan Technological University, USASghaier Guizani UAE University, UAEShancang Li School of Engineering, Swansea University, UKShi Xiao Nanyang Technological University, SingaporeSiby Abraham University of Mumbai, IndiaSilvio Bortoleto Positivo University, BrazilSimon Pietro Romano University of Naples Federico II, ItalySomayajulu D. V. L. N. National Institute of Technology Warangal,
IndiaSong Guo The University of British Columbia, CanadaSong Lin University of California, Riverside, USASoumya Sen University of Pennsylvania, USAStefano Ferretti University of Bologna, ItalyStefano Giordano University of Pisa, ItalyStefano Pesic Cisco Systems, ItalyStefano Tomasin University of Padova, ItalyStefanos Gritzalis University of the Aegean, GreeceSteven Gordon Thammasat University, ThailandSuat Ozdemir Gazi University, TurkeySubir Saha Nokia Siemens Networks, IndiaSubramanian K. Advanced Center for Informatics and
Innovative Learning, IGNOU, IndiaSudarshan T.S.B. Amrita Vishwa Vidyapeetham, Bangalore,
IndiaSugam Sharma Iowa State University, USASurekha Mariam Varghese M.A. College of Engineering, IndiaT. Aaron Gulliver University of Victoria, CanadaTao Jiang Huazhong University of Science and
Technology, P.R. ChinaTarek Bejaoui Mediatron Lab., Carthage University, TunisiaTarun Joshi University of Cincinnati, USATheodore Stergiou Intracom Telecom, UK
XVI Organization
Thienne Johnson University of Arizona, USAThomas Chen Swansea University, UKTsern-Huei Lee National Chiao Tung University, TaiwanUsman Javaid Vodafone Group, UKVamsi Paruchuri University of Central Arkansas, USAVana Kalogeraki University of California, Riverside, USAVehbi Cagri Gungor Bahcesehir University, TurkeyVelmurugan Ayyadurai University of Surrey, UKVicent Cholvi Universitat Jaume I, SpainVictor Govindaswamy Texas A&M University, USAVijaya Kumar B.P. Reva Institute of Technology and Management,
Bangalore, IndiaViji E Chenthamarakshan IBM T.J. Watson Research Center in
New York, USAVino D.S. Kingston Hewlett-Packard, USAVinod Chandra S.S. College of Engineering Thiruvananthapuram,
IndiaVivek Jain Robert Bosch LLC, USAVivek Singh Banaras Hindu University, IndiaVladimir Kropotov D-Link Russia, RussiaWael M El-Medany University of Bahrain, Kingdom of BahrainWaslon Lopes UFCG - Federal University of Campina Grande,
BrazilWei Yu Towson University, USAWei-Chieh Ke National Tsing Hua University, TaiwanWendong Xiao Institute for Infocomm Research, SingaporeXiang-Gen Xia University of Delaware, USAXiaodong Wang Qualcomm, USAXiaoguang Niu Wuhan University, P.R. ChinaXiaoqi Jia Institute of Software, Chinese Academy of
Sciences, P.R. ChinaXinbing Wang Shanghai Jiaotong University, P.R. ChinaXu Shao Institute for Infocomm Research, SingaporeXueping Wang Fudan University, P.R. ChinaYacine Atif UAE University, UAEYali Liu University of California, Davis, USAYang Li Chinese Academy of Sciences, P.R. ChinaYassine Bouslimani University of Moncton, CanadaYe Zhu Cleveland State University, USAYi Zhou Texas A&M University, USAYifan Yu France Telecom R&D Beijing, P.R. ChinaYong Wang University of Nebraska-Lincoln, USAYoungseok Lee Chungnam National University, KoreaYoussef SAID Tunisie Telecom/Sys’Com Lab,ENIT, TunisiaYuan-Cheng Lai Information Management, NTUST, TaiwanYuh-Ren Tsai National Tsing Hua University, Taiwan
Organization XVII
Yu-Kai Huang Quanta Research Institute, TaiwanYusuf Ozturk San Diego State University, USAZaher Aghbari University of Sharjah, UAEZbigniew Dziong University of Quebec, CanadaZhang Jin Beijing Normal University, P.R. ChinaZhenghao Zhang Florida State University, USAZhenzhen Ye iBasis, Inc., USAZhihua Cui Taiyuan University of Science and Technology,
ChinaZhili Sun University of Surrey, UKZhong Zhou University of Connecticut, USAZia Saquib C-DAC, Mumbai, India
ACC 2011 Additional Reviewers
Akshay Vashist Telcordia Telchnologies, USAAlessandro Testa University of Naples Federico II, ItalyAmitava Academy of Technology, IndiaAmmar Rashid Auckland University of Technology,
New ZealandAnand MITS, IndiaBjoern W. Schuller Technical University, GermanyChi-Ming Wong Jinwen University of Science and Technology,
TaiwanDanish Faizan NIC-INDIA, IndiaFatos Xhafa UPC, Barcelona Tech, SpainHooman Tahayori Ryerson University, CanadaJohn Jose IIT Madras, IndiaJyoti Singh Academy of Technology, IndiaKoushik West Bengal University of Technology, IndiaLong Zheng University of Aizu, JapanManpreet Singh M.M. Engineering College, IndiaMaria Striki Telcordia Technologies, Piscataway, USAMohamad Zoinol Abidin Universiti Teknikal Malaysia Melaka, MalaysiaMohamed Dahmane University of Montreal,CanadaMohd Helmy Abd Wahab Universiti Tun Hussein Onn Malaysia, MalaysiaMohd Riduan Bin Ahmad Universiti Teknikal Malaysia Melaka, MalaysiaMohd Sadiq Jamia Millia Islamia, IndiaMudhakar Srivatsa IBM T.J. Watson Research Center, USANan Yang CSIRO, AustraliaNurulnadwan Aziz Aziz Universiti Teknologi MARA, Malaysia
XVIII Organization
Pooya Taheri University of Alberta, CanadaR.C. Wang NTTU, TaiwanRoman Yampolskiy University of Louisville, USAShuang Tian The University of Sydney, AustraliaSyed Abbas Ali Ajman University of Science & Technology,
UAEVelayutham Adhiparasakthi Engineering College,
Melmaruvathur, IndiaYeong-Luh Ueng National Tsing Hua University, Taiwan
International Workshop on Identity: Security,
Management and Applications (ID 2011)
General Chairs
Paul Rodrigues(CTO, WSS, India) Hindustan University, India
H.R. Vishwakarma(Secretary, Computer
Society of India) VIT University, India
Program Chairs
P. Krishna Reddy IIIT, Hyderabad, IndiaSundar K.S. Education & Research, Infosys Technologies
Limited, IndiaSrinivasa Ragavan Intel Inc, USAS. Venkatachalam Jawaharlal Nehru Technological University,
India
Organizing Chair
Madhan Kumar Srinivasan Education & Research, Infosys TechnologiesLimited, India
Organizing Co-chairs
Abhi Saran London South Bank University, UKAnireddy Niranjan Reddy University of Glamorgan, UKRevathy Madhan Kumar Education & Research, Infosys Technologies
Limited, India
Technical Program Committee
Arjan Durresi Indiana University Purdue UniversityIndianapolis, USA
Arun Sivanandham Infosys Technologies Limited, IndiaAvinash Srinivasan Bloomsburg University, USABezawada Bruhadeshwar IIIT, Hyderabad, IndiaBhaskara Reddy AV Infosys Technologies Limited, IndiaBipin Indurkhya IIIT, Hyderabad, India
XX ID 2011
C. Sunil Kumar Jawaharlal Nehru Technological University,India
Chandrabali Karmakar Infosys Technologies Limited, IndiaFarooq Anjum On-Ramp Wireless, USAGudipati Kalyan Kumar Excellence India, IndiaHamid Sharif University of Nebraska-Lincoln, USAHui Chen Virginia State University, USAJie Li University of Tsukuba, JapanKalaiselvam Infineon Technologies, GermanyLau Lung UFSC, BrazilLukas Ruf Consecom AG, SwitzerlandManik Lal Das Dhirubhai Ambani Institute of Information and
Communication Technology (DA-IICT),India
Manimaran Govindarasu Iowa State University, USANarendra Ahuja University of Illinois, USAOmar University of Jordan, JordanPradeep Kumar T.S. Infosys Technologies Limited, IndiaPradeepa Wipro Technologies, IndiaRajiv Tripathi NIT, Allahabad, IndiaRakesh Chithuluri Oracle, IndiaSanjay Chaudhary Dhirubhai Ambani Institute of Information and
Communication Technology (DA-IICT),India
Santosh Pasuladi Jawaharlal Nehru Technological University,India
Satheesh Kumar Varma IIIT, Pune, IndiaSaurabh Barjatiya IIIT, Hyderabad, IndiaSreekumar Vobugari Education & Research, Infosys Technologies
Limited, IndiaSuthershan Vairavel CTS, IndiaTarun Rao Infosys Technologies Limited, IndiaThomas Little Boston University, USATim Strayer BBN Technologies, USAV. Balamurugan IBM, IndiaVasudeva Varma IIIT, Hyderabad, IndiaVinod Babu Giesecke & Devrient, GermanyYonghe Liu UT Arlington, USA
International Workshop on Applications of
Signal Processing(I-WASP 2011)
Workshop Organizers
Jaison Jacob Rajagiri School of Engineering and Technology,India
Sreeraj K.P. Rajagiri School of Engineering and Technology,India
Rithu James Rajagiri School of Engineering and Technology,India
Technical Program Committee
A. Vinod NTU, SingaporeAggelos Katsaggelos Northwestern University, USABing Li University of Virginia, USACarlos Gonzalez University of Castilla-La Mancha, SpainDamon Chandler Oklahoma State University, USAEgon L. van den Broek University of Twente, The NetherlandsFeng Wu Microsoft Research Asia, P.R. ChinaHakan Johansson University of Linkoping, SwedenJoaquim Filipe EST-Setubal, PortugalLotfi Senahdji Universite de Rennes 1, FranceReyer Zwiggelkaar Aberystwyth University, UKXianghua Xie Swansea University, UKYoshikazu Miyanaga Hokkaido University, Japan
International Workshop on Cloud Computing:
Architecture, Algorithms and Applications(CloudComp 2011)
Workshop Organizers
Binu A. Cochin University of Science and Technology,India
Biju Paul Rajagiri School of Engineering and Technology,India
Sabu M. Thampi Rajagiri School of Engineering and Technology,India
Technical Program Committee
Antonio Puliafito University of Messina, ItalyBob Callaway IBM, USAChee Shin Yeo Institute of High-Performance Computing,
SingaporeChin-Sean Sum National Institute of Information and
Communications Technology, JapanChing-Hsien Hsu Chung Hua University, TaiwanDrissa Houatra Orange Labs, FranceDeepak Unnikrishnan University of Massachusetts, USAJie Song Northeastern University, P.R. ChinaSalah Sharieh McMaster University, CanadaFrancesco Longo Universita di Messina, ItalyFabienne Anhalt Ecole Normale Superieure de Lyon–INRIA,
FranceGaurav Somani LNMIIT, Jaipur, IndiaHaibing Guan Shanghai Jiao Tong University, P.R. ChinaHongbo Jiang Huazhong University of Science and
Technology, P.R. ChinaHongkai Xiong Shanghai Jiao Tong University, P.R ChinaHui Zhang Nec Laboratories America, USAItai Zilbershtein Avaya, IsraelJens Nimis University of Applied Sciences, GermanyJie Song Software College, Northeastern University,
China
XXIV CloudComp 2011
Jorge Carapinha PT Inovacao S.A. Telecom Group, PortugalJunyi Wang National Institute of Information and
Communications Technology, JapanK. Chandra Sekaran NITK, IndiaKai Zheng IBM China Research Lab, P.R. ChinaKrishna Sankar Cisco Systems, USALaurent Amanton Havre University, FranceLuca Caviglione National Research Council (CNR), ItalyLukas Ruf Consecom AG, SwitzerlandMassimiliano Rak Second University of Naples, ItalyPallab Datta IBM Almaden Research Center, USAPascale Vicat-Blanc Primet INRIA, FrancePrabu Dorairaj NetApp Inc, IndiaShivani Sud Intel Labs, USAShuicheng Yan National University of Singapore, SingaporeSiani Pearson HP Labs, UKSimon Koo University of San Diego, USASrikumar Venugopal UNSW, AustraliaStephan Kopf University of Mannheim, GermanyThomas Sandholm Hewlett-Packard Laboratories, USAUmberto Villano University of Sannio, ItalyVipin Chaudhary University at Buffalo, USAYaozu Dong Intel Corporation, P.R. ChinaZhou Lan National Institute of Information and
Communications Technology, Japan
International Workshop on Multimedia
Streaming (MultiStreams 2011)
Program Chairs
Pascal Lorenz University of Haute Alsace, FranceFan Ye IBM T.J. Watson Research Center, USATrung Q. Duong Blekinge Institute of Technology, Sweden
Technical Program Committee
Guangjie Han Hohai University, P.R. ChinaAlex Canovas Polytechnic University of Valencia, SpainBrent Lagesse Oak Ridge National Laboratory, USAChung Shue Chen INRIA-ENS, FranceDebasis Giri Haldia Institute of Technology, IndiaMario Montagud Universidad Politecnica de Valencia, SpainDoreen Miriam Anna University, IndiaDuduku V. Viswacheda University Malaysia Sabah, MalaysiaElsa Macıas Lopez University of Las Palmas de Gran Canaria,
SpainEugenia Bernardino Polytechnic Institute of Leiria, PortugalFernando Boronat Instituto de Investigacion para la Gestion
Integrada de Zonas Costeras, SpainJen-Wen Ding National Kaohsiung University of Applied
Sciences, TaiwanJoel Rodrigues IT University of Beira Interior, PortugalJo-Yew Tham A*STAR Institute for Infocomm Research,
SingaporeMarcelo Atenas Universidad Politecnica de Valencia, SpainJorge Bernabe University of Murcia, PolandBao Vo Nguyen Posts and Telecommunications Institute of
Technology, VietnamHans-Juergen Zepernick Blekinge Institute of Technology, SwedenJose Maria Alcaraz Calero University of Murcia, SpainJuan Marin Perez University of Murcia, SpainLei Shu Osaka University, JapanLexing Xie The Australian National University, AustraliaMarc Gilg University of Haute-Alsace, FranceMiguel Garcia Polytechnic University of Valencia, SpainMohd Riduan Bin Ahmad Universiti Teknikal Malaysia, Malaysia
XXVI MultiStreams 2011
Phan Cong-Vinh London South Bank University, UKAlvaro Suarez-Sarmiento University of Las Palmas de Gran Canaria,
SpainSong Guo University of British Columbia, CanadaTin-Yu Wu Tamkang University, TaiwanZhangbing Zhou Institut Telecom & Management SudParis,
FranceZuqing Zhu Cisco System, USAJuan M. Sanchez University of Extremadura, SpainChoong Seon Hong Kyung Hee University, Korea
Second International Workshop on Trust
Management in P2P Systems(IWTMP2PS 2011)
Program Chairs
Visvasuresh VictorGovindaswamy Texas A&M University-Texarkana, USA
Jack Hu Microsoft, USASabu M. Thampi Rajagiri School of Engineering and Technology,
India
Technical Program Committee
Haiguang Fudan University, P.R. ChinaIoannis Anagnostopoulos University of the Aegean, GreeceFarag Azzedin King Fahd University of Petroleum & Minerals,
Saudi ArabiaRoksana Boreli National ICT Australia, AustraliaYann Busnel University of Nantes, FranceJuan-Carlos Cano Universidad Politecnica de Valencia, SpainPhan Cong-Vinh London South Bank University, UKJianguo Ding University of Luxembourg, LuxemburgMarkus Fiedler Blekinge Institute of Technology, SwedenDeepak Garg Thapar University, Patiala, IndiaFelix Gomez Marmol University of Murcia, SpainPaulo Gondim Universidade de Brasilia, BrazilSteven Gordon Thammasat University, ThailandAnkur Gupta Model Institute of Engineering and Technology,
IndiaHoucine Hassan Universidad Politecnica de Valencia, SpainYifeng He Ryerson University, CanadaMichael Hempel University of Nebraska-Lincoln, USASalman Abdul Moiz CDAC, IndiaGuimin Huang Guilin University of Electronic Technology,
P.R. ChinaRenjie Huang Washington State University, USABenoit Hudzia SAP Research, UKHelge Janicke De Montfort University, UK
XXVIII IWTMP2PS 2011
Mohamed Ali Kaafar INRIA, FranceEleni Koutrouli National University of Athens, GreeceStefan Kraxberger Graz University of Technology, AustriaJonathan Loo Middlesex University, UKMarjan Naderan Amirkabir University of Technology, IranLourdes Penalver Valencia Polytechnic University, SpainElvira Popescu UCV, RomaniaGuangzhi Qu Oakland University, USAAneel Rahim COMSATS Institute of Information
Technology, PakistanYonglin Ren SITE, University of Ottawa, CanadaAndreas Riener University of Linz, AustriaSamir Saklikar RSA, Security Division of EMC, IndiaThomas Schmidt HAW Hamburg (DE), GermanyFangyang Shen Northern New Mexico College, USAThorsten Strufe TU Darmstadt, GermanySudarshan Tsb Amrita School of Engineering, IndiaDemin Wang Microsoft, USAFatos Xhafa UPC, Barcelona, SpainJiping Xiong Zhejiang Normal University, P.R. ChinaChang Wu Yu Chung Hua University, Taiwan
Table of Contents – Part II
Database and Information Systems
Balancing between Utility and Privacy for k-Anonymity . . . . . . . . . . . . . . 1Korra Sathya Babu and Sanjay Kumar Jena
Evaluation of Approaches for Modeling of Security in DataWarehouses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Krishna Khajaria and Manoj Kumar
Content Based Compression for Quicx System . . . . . . . . . . . . . . . . . . . . . . . 19Radha Senthilkumar, C. Lingeshwaraa, and A. Kannan
Distributed Software Development
NL-Based Automated Software Requirements Elicitation andSpecification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Ashfa Umber, Imran Sarwar Bajwa, and M. Asif Naeem
Automatic Interface Generation between Incompatible IntellectualProperties (IPs) from UML Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Fateh Boutekkouk, Zakaria Tolba, and Mustapha Okab
Deadlock Prevention in Distributed Object Oriented Systems . . . . . . . . . . 48V. Geetha and N. Sreenath
Identification of Error Prone Classes for Fault Prediction Using ObjectOriented Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Puneet Mittal, Satwinder Singh, and K.S. Kahlon
An Automated Tool for Computing Object Oriented MetricsUsing XML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
N. Kayarvizhy and S. Kanmani
Traceability Matrix for Regression Testing in Distributed SoftwareDevelopment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
B. Athira and Philip Samuel
Testing Agent-Oriented Software by Measuring Agent’s PropertyAttributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
N. Sivakumar, K. Vivekanandan, and S. Sandhya
XXX Table of Contents – Part II
Human Computer Interaction and Interface
Classifier Feature Extraction Techniques for Face Recognition Systemunder Variable Illumination Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Sneha G. Gondane, M. Dhivya, and D. Shyam
Bispectrum Analysis of EEG in Estimation of Hand Movement . . . . . . . . 109Adity Saikia and Shyamanta M. Hazarika
Wavelet Selection for EMG Based Grasp Recognition through CWT . . . . 119Adity Saikia, Nayan M. Kakoty, and Shyamanta M. Hazarika
Information Visualization for Tourist and Travelling in Indonesia . . . . . . . 130Adityo Ashari Wirjono, Ricky Lincoln Z.S., William, andDewi Agushinta R.
The Smart Goal Monitoring System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138Dewi Agushinta R., Bima Shakti Ramadhan Utomo, Denny Satria,Jennifer Sabrina Karla Karamoy, and Nuniek Nur Sahaya
Web Based Virtual Agent for Tourism Guide in Indonesia . . . . . . . . . . . . . 146Kezia Velda Roberta, Lulu Mawaddah Wisudawati,Muhammad Razi, and Dewi Agushinta R.
Local Feature or Mel Frequency Cepstral Coefficients - Which One isBetter for MLN-Based Bangla Speech Recognition? . . . . . . . . . . . . . . . . . . 154
Foyzul Hassan, Mohammed Rokibul Alam Kotwal,Md. Mostafizur Rahman, Mohammad Nasiruddin,Md. Abdul Latif, and Mohammad Nurul Huda
Power Optimization Techniques for Segmented Digital Displays . . . . . . . . 162Rohit Agrawal, C. Sasi Kumar, and Darshan Moodgal
Language Independent Icon-Based Interface for Accessing Internet . . . . . 172Santa Maiti, Debasis Samanta, Satya Ranjan Das, andMonalisa Sarma
Contribution of Oral Periphery on Visual Speech Intelligibility . . . . . . . . . 183Preety Singh, Deepika Gupta, V. Laxmi, and M.S. Gaur
ICT
Geo-Spatial Pattern Determination for SNAP Eligibility in Iowa UsingGIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Sugam Sharma, U.S. Tim, Shashi Gadia, and Patrick Smith
Project Management Model for e-Governance in the Context of KeralaState . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Anu Paul and Varghese Paul
Table of Contents – Part II XXXI
ICT Its Role in e-Governance and Rural Development . . . . . . . . . . . . . . . . 210Deka Ganesh Chandra and Dutta Borah Malaya
Enhancing Sustainability of Software: A Case-Study with MonitoringSoftware for MGNREGS in India . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
C.K. Raju and Ashok Mishra
Internet and Web Computing
Proficient Discovery of Service in Event Driven Service OrientedArchitecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
P. Dharanyadevi, P. Dhavachelvan, S.K.V. Jayakumar,R. Baskaran, and V.S.K. Venkatachalapathy
Web User Session Clustering Using Modified K-Means Algorithm . . . . . . 243G. Poornalatha and Prakash S. Raghavendra
FOL-Mine – A More Efficient Method for Mining Web AccessPattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
A. Rajimol and G. Raju
Semantic Association Mining on Spatial Patterns in Medical Images . . . . 263S. Saritha and G. SanthoshKumar
FCHC: A Social Semantic Focused Crawler . . . . . . . . . . . . . . . . . . . . . . . . . . 273Anjali Thukral, Varun Mendiratta, Abhishek Behl,Hema Banati, and Punam Bedi
A Dynamic Seller Selection Model for an Agent Mediated e-Market . . . . 284Vibha Gaur and Neeraj Kumar Sharma
A Modified Ontology Based Personalized Search Engine Using BondEnergy Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Bhaskara Rao Boddu and Valli Kumari Vatsavayi
A Client Perceived Performance Evaluation of Web Servers . . . . . . . . . . . . 307Ash Mohammad Abbas and Ravindra Kumar
Enhanced Quality of Experience through IVR Mashup to Access SameService Multiple Operator Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Imran Ahmed and Sunil Kumar Kopparapu
Information Content Based Semantic Similarity Approaches forMultiple Biomedical Ontologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
K. Saruladha, G. Aghila, and A. Bhuvaneswary
Taking Project Tiger to the Classroom: A Virtual Lab Case Study . . . . . 337Harilal Parasuram, Bipin Nair, Krishnashree Achuthan, andShyam Diwakar
XXXII Table of Contents – Part II
Green Communications through Network Redesign . . . . . . . . . . . . . . . . . . . 349Sami J. Habib, Paulvanna N. Marimuthu, and Naser Zaeri
Unsupervised Modified Adaptive Floating Search Feature Selection . . . . . 358D. Devakumari and K. Thangavel
Fast and Efficient Mining of Web Access Sequences Using Prefix BasedMinimized Trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
M. Thilagu and R. Nadarajan
Mobile Computing
Scalable, High Throughput LDPC Decoder for WiMAX (802.16e)Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
Muhammad Awais, Ashwani Singh, and Guido Masera
Unique Mechanism of Selection of Traffic Flow Templates for MobilityIP Protocols Using Multihoming and IP Flow Mobility on theNGMN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Gustavo Jimenez and Yezid Donoso
Elliptic Curve Cryptography for Smart Phone OS . . . . . . . . . . . . . . . . . . . . 397Sharmishta Desai, R.K. Bedi, B.N. Jagdale, and V.M. Wadhai
An Improved Secure Authentication Protocol for WiMAX with FormalVerification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Anjani Kumar Rai, Shivendu Mishra, and Pramod Narayan Tripathi
Secured Fault Tolerant Mobile Computing . . . . . . . . . . . . . . . . . . . . . . . . . . 417Suparna Biswas and Sarmistha Neogy
A Survey of Virtualization on Mobiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430Suneeta Chawla, Apurv Nigam, Pankaj Doke, and Sanjay Kimbahune
Mobile Peer to Peer Spontaneous and Real-Time Social Networking . . . . 442Abhishek Varshney and Mohammed Abdul Qadeer
Analysis of a Traffic Classification Scheme for QoS Provisioning overMANETs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
Chhagan Lal, V. Laxmi, and M.S. Gaur
Multi Agent Systems
Modeling and Verification of Chess Game Using NuSMV . . . . . . . . . . . . . . 460Vikram Saralaya, J.K. Kishore, Sateesh Reddy,Radhika M. Pai, and Sanjay Singh
Table of Contents – Part II XXXIII
SMMAG: SNMP-Based MPLS-TE Management Using MobileAgents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
Muhammad Tahir, Dominique Gaiti, and Majid Iqbal Khan
Multimedia and Video Systems
Face Detection and Eye Localization in Video by 3D UnconstrainedFilter and Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Pradipta K. Banerjee, Jayanta K. Chandra, and Asit K. Datta
Secret Image Sharing Using Steganography with Different CoverImages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
Noopa Jagadeesh, Aishwarya Nandakumar, P. Harmya, andS.S. Anju
A Secure Data Hiding Scheme Based on Combined Steganography andVisual Cryptography Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498
Aishwarya Nandakumar, P. Harmya, Noopa Jagadeesh, andS.S. Anju
Cognitive Environment for Pervasive Learners . . . . . . . . . . . . . . . . . . . . . . . 506Sattvik Sharma, R. Sreevathsan, M.V.V.N.S. Srikanth,C. Harshith, and T. Gireesh Kumar
A Robust Background Subtraction Approach Based on DaubechiesComplex Wavelet Transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
Anand Singh Jalal and Vrijendra Singh
File System Level Circularity Requirement . . . . . . . . . . . . . . . . . . . . . . . . . . 525Mukhtar Azeem, Majid Iqbal Khan, and Arfan Nazir
An Adaptive Steganographic Method for Color Images Based on LSBSubstitution and Pixel Value Differencing . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
Azzat A. Al-Sadi and El-Sayed M. El-Alfy
Parallel and Distributed Algorithms
Communication Aware Co-scheduling for Parallel Job Scheduling inCluster Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
A. Neela Madheswari and R.S.D. Wahida Banu
Shared Resource Allocation Using Token Based Control Strategy inAugmented Ring Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
Rajendra Prasath
An Algorithmic Approach to Minimize the Conflicts in an OpticalMultistage Interconnection Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
Ved Prakash Bhardwaj, Nitin, and Vipin Tyagi
XXXIV Table of Contents – Part II
An Efficent Methodology for Realization of Parallel FFT for LargeData Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
Peter Joseph Basil Morris, Saikat Roy Chowdhury, and Debasish Deb
A Novel Approach for Adaptive Data Gathering in Sensor Networks byDynamic Spanning Tree Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Suchetana Chakraborty and Sushanta Karmakar
Hardware Efficient Root-Raised-Cosine Pulse Shaping Filter forDVB-S2 Receivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Vikas Agarwal, Pansoo Kim, Deock-Gil Oh, and Do-Seob Ahn
Security, Trust and Privacy
Security Analysis of Multimodal Biometric Systems against SpoofAttacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
Zahid Akhtar and Sandeep Kale
A Novel Copyright Protection Scheme Using Visual Cryptography . . . . . 612Amitava Nag, Jyoti Prakash Singh, Sushanta Biswas,D. Sarkar, and Partha Pratim Sarkar
A Weighted Location Based LSB Image Steganography Technique . . . . . . 620Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh,Sushanta Biswas, D. Sarkar, and Partha Pratim Sarkar
Comments on ID-Based Client Authentication with Key AgreementProtocol on ECC for Mobile Client-Server Environment . . . . . . . . . . . . . . . 628
SK Hafizul Islam and G.P. Biswas
Covariance Based Steganography Using DCT . . . . . . . . . . . . . . . . . . . . . . . . 636N. Sathisha, K. Suresh Babu, K.B. Raja, K.R. Venugopal, andL.M. Patnaik
An Efficient Algorithm to Enable Login into Secure Systems UsingMouse Gestures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648
Usha Banerjee and A. Swaminathan
Intrusion Detection by Pipelined Approach Using Conditional RandomFields and Optimization Using SVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656
R. Jayaprakash and V. Uma
A Flow-Level Taxonomy and Prevalence of Brute Force Attacks . . . . . . . . 666Jan Vykopal
Multi Application User Profiling for Masquerade Attack Detection . . . . . 676Hamed Saljooghinejad and Wilson Naik Rathore
Table of Contents – Part II XXXV
A Novel Technique for Defeating Virtual Keyboards - ExploitingInsecure Features of Modern Browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Tanusha S. Nadkarni, Radhesh Mohandas, and Alwyn R. Pais
SQL Injection Disclosure Using BLAH Algorithm . . . . . . . . . . . . . . . . . . . . 693Justy Jameson and K.K. Sherly
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703