V. Kavinilavu, S. Salivahanan, V. S. K. Bhaaskaran, S. Sakthikumaran, B. Brindha, C. Vinoth
{"title":"Implementation of Convolutional encoder and Viterbi decoder using Verilog HDL","authors":"V. Kavinilavu, S. Salivahanan, V. S. K. Bhaaskaran, S. Sakthikumaran, B. Brindha, C. Vinoth","doi":"10.1109/ICECTECH.2011.5941609","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941609","url":null,"abstract":"A Viterbi decoder uses the Viterbi algorithm for decoding a bit stream that has been encoded using Forward error correction based on a Convolutional code. The maximum likelihood detection of a digital stream is possible by Viterbi algorithm. In this paper, we present a Convolutional encoder and Viterbi decoder with a constraint length of 7 and code rate of 1/2. This is realized using Verilog HDL. It is simulated and synthesized using Modelsim PE 10.0e and Xilinx 12.4i.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121989610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey of potential attacks on web services and web service compositions","authors":"Sunita Tiwari, Pratibha Singh","doi":"10.1109/ICECTECH.2011.5941653","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941653","url":null,"abstract":"Web services and web service composition are a new phase of distributed computing, build on the top of distributed models. Web services are being used largely for business integration. One of the major concerns for today's businesses is to implement adequate security for web services and web service compositions. Attacks on web services can sometimes destroy entire network and also can expose organization's valuable resources to outside world. As a result of our study we present in this paper some important vulnerabilities and possible attacks on web services and web service composition. Further we have listed important vulnerabilities in context of atomic and composite web services along with possible countermeasures.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122078081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable communication for MANETS in military through identification and removal of byzantine faults","authors":"R. Sivakami, G. Nawaz","doi":"10.1109/ICECTECH.2011.5942024","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942024","url":null,"abstract":"A MANETS (Mobile Ad Hoc Networks) is a spontaneous network that can be established without any infrastructure. Problems are faced while setting up and using a MANET which is both reliable and secure. Transmitting message over multiple paths will increase the security and reliability of transmission in an open collaborative MANET environment where any node can maliciously or selfishly disrupt and deny communication of other nodes. An SMT protocol [1] provides a way to secure message transmission by dispersing the message among several paths with minimal redundancy. The multiple routes selected are known as APS — Active Path Set. An improved way of secured and reliable communication in military using MANETS is presented in this work. This work is towards improving the security of the message transmission among multiple routes by including the most reliable routes in the active path sets through the identification and removal of Byzantine Faults. The route discovery process with binary search probing technique is resilient to Byzantine failures caused by individual or colluding nodes. Malicious links are detected and these links are then avoided by multiplicatively increasing their weights. The fault detection algorithm bounds logarithmically (log n — n the number of nodes in the path), so the delay is reduced drastically. The simulated implementation of the work clearly shows 16 percent increase in average throughput.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122130279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhancement of security of image using permutation of RGB-components","authors":"Sabyasachi Samanta, S. Dutta, G. Sanyal","doi":"10.1109/ICECTECH.2011.5941727","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941727","url":null,"abstract":"Data bits from textual message are encrypted through key to some suitable nonlinear pixel and bit positions about the entire image. As a result, we get a watermarked image. After that we have formed three different image shares using any two components of R, G and B of entire watermarked image. The key is also divided into three different logical blocks by digits. By combining any two blocks of key we have formed key shares and have assigned to image shares. Out of those three shares, only addition of any two is able to make the full image or key. At the decryption end through appropriate arrangement of shares of key and image, make possible to retrieve hidden data bits from watermarked image and reform into its original content.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128240381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical morphological edge detection for remote sensing images","authors":"Beant Kaur, Anil Garg","doi":"10.1109/ICECTECH.2011.5942012","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942012","url":null,"abstract":"Edge detection is a terminology in image processing and computer vision particularly in the areas of feature detection and extraction to refer to the algorithms which aims at identifying points in a digital image at which the image brightness changes sharply or more formally has discontinuities. The need of edge detection is to find the discontinuities in depth, discontinuities in surface orientation, changes in material properties and variations in scene illumination. Remote sensing images are generally corrupted from noise. Mathematical morphology is a new technique for edge detection. It is a theory and technique for analysis and processing of geometrical structures, based on set theory. Mathematical morphology was originally developed for binary images, and later extends to grey scale functions and images. Basically the noise can be easily suppressed by mathematical morphology. So by using mathematical morphology the image can be enhanced and the edges can be detected. The result of edge detection using mathematical morphology will be compared with Sobel edge detector, Prewitt edge detector, laplacian of gaussian edge detector and Canny edge detector.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"15 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finite element analysis of fractured finger with implant fixation using MIMICS","authors":"Saumya Soman, M. Anburajan","doi":"10.1109/ICECTECH.2011.5941776","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941776","url":null,"abstract":"Arthrodesis and arthroplasty are two surgical options for the treatment of metacarpophalangeal joint disease or injuries. Arthrodesis is a fusion of the two bones which will restrict the joint range of motion. Arthroplasty involves replacing the diseased joint with a prosthesis which is preferable to arthrodesis due to the restoration of normal joint function. In arthroplasty, a hinged prosthesis is inserted between the metacarpal and the first phalanx. Implants made were introduced to allow maximum joint flexibility and reduce joint pain effectively. Surgical treatment of Metacarpophalangeal joint fracture use prosthesis for the joint replacement. Even though mobility is restored to the joint, there have been reports of complications associated with implant instability and wear. In this study prostheses for metacarpophalangeal joint replacement have to be designed and analyzed the stability of the implant using 3Dimensional Finite Element Analysis. Different load conditions were given to analyze the stress developed, using ANSYS. Computed tomography data of the middle finger was used to construct the joint and a load was applied to the proximal interphalangeal joint to simulate flexion. CT data of the fractured finger is imported into MIMICS software. Using the tools in Mimics software segmentation of the finger can be performed. Design a suitable Swanson implant for the metacarpophalangeal fracture using Autodesk Inventor software. Fixation of the implant to the fracture location was performed using MIMICS so as to reduce the number of triangles and imported to ANSYS software for the analysis and this can be performed by giving different load conditions. Compare the FEA of normal finger with the implant fixed finger.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129042047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of mandibular reconstruction plate using Finite Element Analysis","authors":"C. Blessy, M. Anburajan, S. Ramkumar","doi":"10.1109/ICECTECH.2011.5941769","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941769","url":null,"abstract":"The current clinical procedure for mandible fracture fixation is plate application. Implant success is a function of biomaterials and biomechanical factors, including: materials and material processing; mechanisms of implant/tissue attachment; mechanical properties; implant design; loading type; tissue properties; stress and strain distributions; initial stability and mechanisms of enhancing osseo integration; biocompatibility; and surface chemistry, mechanics, and bone-binding ability of the implant. 3D reconstructions are used to validate procedures numerically preceding experimental analysis. This study outlines the methods used to reconstruct a 3D model of the mandible and evaluating the miniplated mandible for normal functioning. A CT scan from a 22-year-old male patient with a healthy un fractured mandible and also CT scan of 22 year old patient with left symphaseal fracture, and CT scan post surgery ie plated mandible was obtained. A 3D reconstruction was carried out using MIMICS via thresholding and segmentation techniques. Boundary conditions and muscle forces were applied, and simulations were performed using ANSYS 10 workbench. 3D reconstruction allows for precise anatomical dimensions, which can be used for further engineering analysis. Using Finite Element Analysis results showed that the mandible model returned to normal function post-plating. The study shows the clinical relevance of 3D reconstructions to plan surgical procedures. Results illustrate the benefit of carrying out FEA as a prerequisite to experimental modeling and as a method of pre-validating surgical procedures.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129046652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid approach using majority voting for signature recognition","authors":"M. Roja, S. Sawarkar","doi":"10.1109/ICECTECH.2011.5941717","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941717","url":null,"abstract":"Biometric systems based only on unimodal biometrics are often not able to meet the desired performance requirements due to problems such as noisy data, restricted degree of freedom, spoof attacks and unacceptable error data. Some of these drawbacks can be minimized by multimodal biometric systems. Multimodal biometrics consists in combining two or more biometric modalities in a single identification system to improve the recognition accuracy. This paper proposes a multi algorithm based signature recognition system.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124700655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Manavalan, S. Chattopadhyay, Mangala, Sundararajan, Kishor Gupta
{"title":"Grid based virtual visualization and web services model","authors":"R. Manavalan, S. Chattopadhyay, Mangala, Sundararajan, Kishor Gupta","doi":"10.1109/ICECTECH.2011.5942021","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942021","url":null,"abstract":"This paper brings out the details of a GARUDA Grid supported virtual visualization and collaborative model built to support the Grid Virtual Organization members as well as to the nationwide end users who can make use of the high end HPC/Grid simulation results for their application. Initially from Grid visualization cluster, through a customized secured portal interface mechanism the visualization functions of many open source software tools have been virtually made available between and across the remote Grid user locations. Subsequently the end user specific information has been filtered out from the processed grid simulation results and been transferred to a web server environment. Non-Grid application members as well as public users can access this web server to get the information pertaining to their application interest as well as can collaborate with equal minded researcher. The complete model has been demonstrated by Grid enabling a Flood assessment model only using the open source tools","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124701207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extended WS-FIT model to enhance the fault tolerance in the dynamic composite web service","authors":"N. Sasikaladevi, L. Arockiam","doi":"10.1109/ICECTECH.2011.5941949","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941949","url":null,"abstract":"Numerous web services are evolving now. Organizational work flows are simulated by using composite web services. Because of the increasing number of web services, atomic web services that are involved in the composite web service are selected dynamically. Quality of Service (QoS) in web service plays a vital role today. Among all QoS metrics, reliability plays the dominant role. One of the reliability factors is dependability. Dependability is the ability to avoid service failures. In this paper, a extended model of WS-FIT is proposed to increase the dependability in the dynamic composite web service using fault injection technique.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124774867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}