{"title":"Status Monitoring of Jobs in Heterogeneous Grid Environments","authors":"G. Sumathi, N. Gopalan","doi":"10.1109/INDCON.2006.302837","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302837","url":null,"abstract":"Computational grids are emerging as a computing paradigm for solving challenging applications in science, engineering and economics. Since the grid is a vast array of resources, monitoring of the grid is essential to improve debugging facilities and performance enhancement. Monitoring system must be able to provide information about the current state of various grid entities such as grid resources and running jobs as well as to provide notifications when certain important events occur. In this paper we provide a status monitoring system, which keeps track of the percentage of the job completed. It uses computational complexity and level of parallelism based algorithm for global scheduling and bottoms up heuristic for local scheduling the jobs. This heuristic technique efficiently maps tasks to resources so as to minimize the computing power consumed due to communication and computation","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133603434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shared Based Rate Limiting: An ISP level Solution to Deal DDoS Attacks","authors":"R. Sharma, Krishan Kumar, Kuldip Singh, R. Joshi","doi":"10.1109/INDCON.2006.302831","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302831","url":null,"abstract":"Today distributed denial of service (DDoS) attacks is a major problem to the availability of Internet services. Several schemes have been proposed for countering DDoS attacks directed at an Internet server, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. In this paper we propose a dynamic rate throttling technique that will greatly minimize the impact of attack. The basic mechanism is to have monitoring, rate limiting and filtering routers at various levels of ISPs. The participating routers, start there function after getting a signal from a server under attack. Our scheme is invoked only during attack times, and is able to mitigate attack traffic through dynamic filtering. Server tells edge routers to rate limit the traffic according to the share of traffic which is being passed through particular routers. The solution proposed is an ISP level solution which is practical enough to be implemented. We simulate the scheme in NS-2 in Linux system. We use an Internet type topology to test our scheme and web traffic was generated to evaluate the effectiveness of scheme. Our scheme shows good improvement over static router throttling techniques which were proposed earlier. Hence we believe that the scheme proposed in this paper seems to be a promising approach to prevent DDoS attacks","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"abs/2304.00450 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132927865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neuro-Genetic based Speech Processing for Promoting Global Cyber Security using Steganography technique","authors":"T. S. Sinha, G. Sanyal","doi":"10.1109/INDCON.2006.302799","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302799","url":null,"abstract":"The goal of cryptography is to provide confidentiality and privacy by encrypting the information. If any unauthorized human body does cryptanalysis then this goal may be defeated. In this paper the authors have attempted an algorithm called STEG_NGBSP (steganography/neuro-genetic based speech processing) using a technique called steganography that inherits some features of cryptography in such a way, that the information is encrypted as well as hidden. The methodology adopted here is the concept of null ciphers, which are extracted from the speech signal of a Bengali speaker using neuro-genetic approach. The speech signal is processed and then veiled with an image. Every image is encapsulated with some information, which may be decrypted at the receivers end using the master image-voiced frame, in which the speech data is covered by another image. The proposed algorithm is unique in handling the security measures from steganalysis, thus promoting global cyber security and bridging the gap between the computer and the user with more security through natural language processing","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Integer Wavelet Transform on Software Configurable Processor","authors":"S. Pandey, U. Niranjan","doi":"10.1109/INDCON.2006.302815","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302815","url":null,"abstract":"Imaging in medicine has become so common that it is necessary that we have an image compression standard for the medical images. The JPEG 2000 standard is the latest from the JPEG group. The JPEG 2000 is more computationally intensive than the JPEG. In this work we propose a faster implementation of the integer wavelet transform used in the JPEG 2000 standard. We have implemented the integer wavelet transform on the Stretch's software configurable processor (SCP). A comparison of a Pentium based implementation and the SCP based implementation was done. In our work we have found that the wavelet transform calculations took nearly 35 times less number of clock cycles on the SCP when compared to one with the Pentium implementation","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115493682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sudarsun, G. Venkatesh Prabhu, V. Sathish Kumar
{"title":"Role of Weighting on TDM in Improvising Performance of LSA on Text Data","authors":"S. Sudarsun, G. Venkatesh Prabhu, V. Sathish Kumar","doi":"10.1109/INDCON.2006.302788","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302788","url":null,"abstract":"In this paper, we show that the efficiency of LSA is significantly controlled by the choice of weighting algorithm applied. These weighting algorithms allocate relative importance to the document attributes (e.g. keywords) based on their occurrences in the corpus. Effects of different weighting algorithms are the central point of this paper. We experimented with various weighting algorithms to evaluate and study their effects as measured by precision and recall values. Our experiments include weighting function application on TDM (pre-weighting) in order to increase or decrease the relative importance of words based on their occurrence. We also evaluated the application of weighting functions on the projected query (post-weighting). Post-weighted keyword queries were projected on an LSA model built on pre-weighted TDM to obtain closely correlated keywords or a document (keyword collection). We have developed a prototype IR query projection tool which projects keyword queries on the LSA model to retrieve relevant keywords with a floating-point score","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132517303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perfect Reconstruction in Non-biorthonormal Filter Banks using Vector Space Approach","authors":"S. Nalbalwar, S. Joshi, R. Patney","doi":"10.1109/INDCON.2006.302755","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302755","url":null,"abstract":"A formulation is proposed for construction of PRFB from a given non-PRFB and is described using vector space framework for filter banks. To construct PRFB, a transmultiplexer (TMUX) structure is inserted into the subband such that the synthesis and analysis parts of the TMUX are biorthonormal to analysis and synthesis bank of the given filter bank. The TMUX is a represented by transformation matrix. In addition to PR, in this paper, another objective is to study and exploit the properties of transformation matrix corresponding to non-PR TMUX. The transformation matrix is portioned into distinct subblocks. In case of uniform filter bank (UFB) it is shown that each subblock of transformation matrix has convolution matrix structure. Whereas in case of nonuniform filter bank (NUFB) it is shown that each of these subblock has a structure consisting of interspersed convolution matrices. Implementation of these matrices using discrete time FIR or IIR filters are also shown in this paper. It is also shown that implementation of convolution matrices involve linear time invariant filters whereas interspersed convolution matrices involve the time varying filters. During the implementation of transformation matrix it is also found that some of the blocks can be derived by using implemented blocks. By inserting one or more TMUXs in the subbands and merging with subchannels of UFB we can obtained NUFB from given UFB. There are various application of NUFB over UFB such as speech and audio signal processing where nonuniform division of bands is important","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131456404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systematic Analysis, Design and Optimization of On-Chip Spiral Inductor for Si based RFIC's","authors":"G. Haobijam, R. Paily","doi":"10.1109/INDCON.2006.302818","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302818","url":null,"abstract":"The figure of merit of an on-chip spiral inductor is given by its quality factor (g), self resonance frequency (fres) and optimum frequency (fmax). This paper presents a systematic analysis of the tradeoffs of the figure of merits with the layout parameters associated with the spiral inductor. The width of the metal trace of the spiral must be decided based on the desired operating frequency and the number of turns must be chosen considering the trade off between the quality factor and the area to minimize the cost. An efficient method to determine the optimum layout parameters for any inductance value that results the highest quality factor possible in a given technology is proposed. The proposed method solves the design complexity by deciding these performance controlling parameters based on a lumped physical model","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130944370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modified Photonic Switch Architecture based on Fiber Loop Memory","authors":"R. Srivastava, V. Mangal, R.K. Singh, Y. N. Singh","doi":"10.1109/INDCON.2006.302784","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302784","url":null,"abstract":"In this paper we have proposed design modifications in fiber optic loop buffer switch. This paper discusses an automatic gain controlling (AGC) scheme for the loop buffer. We have shown that by changing the position of EDFA automatic gain controlling scheme will not be required. We have utilized the availability of filter in tunable wavelength converter (TWC) to reduce number of components in the buffer. Finally we replaced the combination of splitter and filter as in existing architecture by array waveguide grating (AWG) demultiplexer, which reduces the loss in the architecture. The performance evaluation of the switch is done in terms of packet loss probability and delay","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116058838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"StegoBreaker: Audio Steganalysis using Ensemble Autonomous Multi-Agent and Genetic Algorithm","authors":"S. Geetha, S.S. Sivatha Sindhu, A. Kannan","doi":"10.1109/INDCON.2006.302771","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302771","url":null,"abstract":"The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message in multi-medium. This creates a potential problem when this technology is misused for planning criminal activities. Differentiating anomalous audio document (stego audio) from pure audio document (cover audio) is difficult and tedious. Steganalytic techniques strive to detect whether an audio contains a hidden message or not. This paper investigates the use of genetic algorithm (GA) to aid autonomous intelligent software agents capable of detecting any hidden information in audio files, automatically. This agent would make up the detection agent in an architecture comprising of several different agents that collaborate together to detect the hidden information. The basic idea is that, the various audio quality metrics (AQMs) calculated on cover audio signals and on stego-audio signals vis-a-vis their denoised versions, are statistically different. GA employs these AQMs to steganalyse the audio data. The overall agent architecture will operate as an automatic target detection (ATD) system. The architecture of ATD system is presented in this paper and it is shown how the detection agent fits into the overall system. The design of ATD based audio steganalyzer relies on the choice of these audio quality measures and the construction of a GA based rule generator, which spawns a set of rules that discriminates between the adulterated and the untouched audio samples. Experimental results show that the proposed technique provides promising detection rates","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124381447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Significance of Software Metrics in ERP Projects","authors":"S. Parthasarathy, N. Anbazhagan","doi":"10.1109/INDCON.2006.302776","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302776","url":null,"abstract":"Software engineering metrics are units of measurement that are used to characterize the software engineering products and processes. Enterprise resource planning (ERP) is a generic term for integrated systems. ERP projects are a subclass of software projects often accompanied by large-scale organizational changes. One of the major reasons found in the literature for the failure of ERP projects is the poor management of software processes. In this paper, we propose a software metrics plan (SMP) containing different software metrics to manage software processes during ERP implementation. Two hypotheses have been formulated and tested using statistical techniques to validate the SMP. The statistical analysis of the collected data from an ERP project supports the two hypotheses, leading to the conclusion that the software metrics are momentous in ERP projects","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117238791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}