{"title":"Raising the Performance of Nakagami Multipath Fading channel with multiuser diversity in reliable wireless medium","authors":"K. Jayanthi, V. Arunachalam, C. Vasanthanayaki","doi":"10.1109/ICRTIT.2012.6206762","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206762","url":null,"abstract":"Today's society demands fast and reliable wireless communication, and the wireless spectrum grows more and more crowded as a consequence of more spectrally efficient transmission schemes can relieve the pressure on the bandwidth resources. In this proposed system, we propose a new framework for generating the correlated MIMO Nakagami Multipath Fading (NMF) channels which possess arbitrary and different m for each sub channel. An advantage of the Nakagami over the Rayleigh and Rice model is the relatively an expression for the Probability Density Function (PDF) and received CSNR (channel signal-to-noise ratio). The diversity is produced by the depolarization of the transmitted signal by reflection, diffraction, and scattering in the channel of NMF. In this proposed work, Maximal Ratio combining (MRC) diversity is used to producing an output with an acceptable SNR and best statistical reducing of multipath fading effect. The result of this proposed system, NMF and MRC diversity methods are combined to, a novel simple and high efficient generation method is developed to scrutinize an excellent accuracy in wireless media, for simulating processes in Matlab.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126149724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DDoS Detection using host-network based metrics and mitigation in experimental testbed","authors":"B. Devi, G. Preetha, S. Shalinie","doi":"10.1109/ICRTIT.2012.6206744","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206744","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks is very recent and popular devastating attack in the field of cyber society. Flooding DDoS attacks produce adverse effects for critical infrastructure availability, integrity and confidentiality. Current defense approaches cannot efficiently detect and filter out the attack traffic in real time. Online analysis of real time attack traffic and their impact and degradation of host and network based performance metrics becomes very essential. So, online measurement of these network performance metrics itself acts as an Intrusion detection system. The anomalies are the inference for network security analyst to suspect whether the network is under attack or not. Based on the assumption that the attacker flows are very aggressive than the legitimate users the proposed work provides sufficient bandwidth to genuine users during flooding DDoS attack. The Interface Based Rate Limiting (IBRL) algorithm proposed in this paper is used to mitigate the identified DDoS attacks. The implementation is carried out on an experimental testbed build up on Linux machines and Virtual routers. The experimental results show that there is considerable increase in the host and network based performance metrics for legitimate users even under DoS and DDoS attacks.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122069631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud intelligent track - Risk analysis and privacy data management in the cloud computing","authors":"M. Aswin, M. Kavitha","doi":"10.1109/ICRTIT.2012.6206752","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206752","url":null,"abstract":"Cloud computing is a computing platform with the backbone of internet to store, access the data and application which is in the cloud, not in the computer. The biggest issue which should be addressed in cloud computing are security and privacy. Outsourcing data to other companies worries internet clients to think about the privacy data. Most Enterprise executives hesitate to use cloud computing system due to their sensitive enterprise information. This paper provides data integrity and user privacy through cloud intelligent track system. This paper discuss about the previous experiment done on the privacy and data management. The work proposes the Architecture or system which provides intelligent track in Privacy Manager and Risk Manager to address privacy issues which rules the cloud environment.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117021183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient relay station placement strategy for broadband wireless networks - 4G","authors":"M. Nivedita, G. Raja","doi":"10.1109/ICRTIT.2012.6206817","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206817","url":null,"abstract":"WiMAX (Worldwide interoperability for Microwave Access) is the emerging broadband wireless access technology that allows interoperability and combines the benefits offered by other wireless networking technologies. This allows WiMAX to lead the path towards 4G. To meet the growing demand for throughput, and in order to relay traffic for Subscriber Stations (SS), Relay station (RS) is introduced by WiMAX networks. The coverage area of a Base Station (BS) can be extended by RSs. It is not easy to install many BSs which involve more cost and infrastructure this type of architecture is suitable for rural areas. The problem of finding location to place the RS exists in these broadband WiMAX networks. To solve this problem, an efficient RS placement strategy is proposed in this work. The RS placement will increase the throughput of the network. For the given MS distribution this algorithm will give the efficient results for the relay location planning. The throughput is to be improved further by taking into account the frequency reuse concept and the inter-cell interference caused due to it. The simulation result depicts the performance of the proposed algorithm.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130572902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D CT image reconstruction of the vertebral column","authors":"J. Athertya, S. Poonguzhali","doi":"10.1109/ICRTIT.2012.6206812","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206812","url":null,"abstract":"Imaging techniques in medical field are mainly practised for diagnosing and treatment of diseases as well as surgical operations. Reconstruction of three dimension models using two dimension image slices of CT add to the uniqueness while picturing the internal details of the organ. The three dimensional (3D) visualization of spine relays highly classified details in diagnosing the complications involved. The objective of this paper is to develop an algorithm for stacking the 2D slices to create a 3D output for image guided surgeries. This aims at increasing the operation accuracy and safety during computer aided medical procedures. One such is the spinal fusion processes where only a marginal error is allowed. Also traditional techniques for analyzing tortuous anatomical structures do not provide sufficient details. The rendered output provides a better graphic user interface in aiding physicians. The model of spinal column is mainly reconstructed for identifying Scoliosis, Spondylolisthesis, Spondylolysis and other vertebral deformations.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126402292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of genetic algorithm based IDS for MANET","authors":"K. Sujatha, V. Dharmar, R. Bhuvaneswaran","doi":"10.1109/ICRTIT.2012.6206796","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206796","url":null,"abstract":"A MANET (Mobile Adhoc Network) is an infrastructure-less self configuring wireless networks of routers. It has potential applications in totally unpredictable and dynamic environment. Routing protocol used here is a form of reactive routing called AODV. AODV (Adhoc On Demand Distance Vector) routes based on demand. The major benefit of AODV is minimum connection setup delay and assignment of sequence numbers to destination to identify the latest route. The route updates are done by periodic beaconing. This network is susceptible to various hazards. In specification based Intrusion Detection system, certain characteristics of vital objects are analyzed and any abnormality is detected. We propose a technique to analyze the exposure to attacks in AODV, specifically the most common network layer hazard, Black Hole attack and to develop a specification based Intrusion Detection System (IDS) using Genetic Algorithm approach. The proposed system is based on Genetic Algorithm, which analyzes the behaviors of every node and provides details about the attack. Genetic Algorithm Control (GAC) is a set of various rules based on the vital features of AODV such as Request Forwarding Rate, Reply Receive Rate and so on. The performance of MANET is analyzed based on GAC.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131978978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face recognition using subspaces techniques","authors":"G. P. Teja, S. Ravi","doi":"10.1109/ICRTIT.2012.6206780","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206780","url":null,"abstract":"With many applications in various domains, Face Recognition technology has received a great deal of attention over the decades in the field of image analysis and computer vision. It has been studied by scientists from different areas of psychophysical sciences and those from different areas of computer science. Psychologists and neuro-scientists mainly deal with the human perception part of the topic where as engineers studying on machine recognition of human faces deal with the computational aspects of Face Recognition. Face Recognition is an important and natural human ability of a human being. However developing a computer algorithm to do the same thing is one of the toughest tasks in computer vision. Research over the past several years enables similar recognitions automatically. Various face recognition techniques are represented through various classifications such as, Image-based face recognition and Video-based recognition, Appearance-based and Model-based, 2D and 3D face recognition methods. This paper gives a review of different face recognition techniques available as of today. The focus is on subspace techniques, investigating the use of image pre-processing applied as a preliminary step in order to reduce error rates. The Principle Component Analysis, Linear Discriminant Analysis and their modified methods of face recognition are implemented under subspace techniques, computing False Acceptance Rates (FAR)and False Rejection Rates (FRR) on a standard test set of images that pose typical difficulties for recognition. By applying a range of image processing techniques it is demonstrated that the performance is highly dependent on the type of pre-processing steps used and that Equal Error Rates (EER) of the Eigenface and Fisherface methods can be reduced using the method proposed in this paper.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132479998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology based EMR for decision making in health care using SNOMED CT","authors":"J. Julina, D. Thenmozhi","doi":"10.1109/ICRTIT.2012.6206787","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206787","url":null,"abstract":"Health care domain is gaining more focus in the field of Ontology and Semantic research. Ontology in medicine helps in proper representation and organization of clinical terminologies. An Electronic Medical Record (EMR) based on Ontology plays a significant role in decision making process. However there is a lack of standards in constructing Ontology, based on the current needs of the healthcare professionals, which results in poor quality of information extraction. This paper proposes the use of Systematized Nomenclature of Medicine Clinical Terms (SNOMED CT), an existing medical Ontology which can be restructured to a high quality Ontology for achieving efficient information extraction. An EMR captures accurate patient information based on enriched Ontology thereby making it suitable for decision making with the help of Bayesian Belief approach.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132936047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of low cost intelligent wheelchair","authors":"Mohammed Faeik Ruzaij, S. Poonguzhali","doi":"10.1109/ICRTIT.2012.6206809","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206809","url":null,"abstract":"The wide spread prevalence of lost limbs and sensing system is of major concern in present day due to wars, accident, age and health problems. An intelligent wheelchair is developed to help these type of patients by using speech recognition system to control the movement of wheelchair in different directions by using voice commands and also the simple movement of the patient's fingers with keypad control. Automatic obstacle detection is done using an ultrasound system which helps the patient to apply a temporary brake in case any obstacle suddenly comes in the way of the wheelchair. The intelligent wheelchair is designed in such a way that it can be controlled easily with minimum effort from the patient and also provides protection from obstacle collision if any voice mistake happens. The main advantage is the low cost design which allows more number of patients to use this type of wheelchair.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130764172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Somasundaram, K. Govindarajan, M. Rajagopalan, S. M. Rao
{"title":"An architectural framework to solve the interoperability issue between private clouds using semantic technology","authors":"T. Somasundaram, K. Govindarajan, M. Rajagopalan, S. M. Rao","doi":"10.1109/ICRTIT.2012.6206764","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206764","url":null,"abstract":"Cloud Computing is the blending technology of parallel and distributing computing paradigm, and its main aim is providing Everything as a Service (XaaS) to the consumers. The Infrastructure as a Service (IaaS) is one type of service models in Cloud Computing to provide infrastructure to the customers. The private cloud is one of the deployment models in cloud computing, and it offers resources to the consumers in an on-demand manner within or inside the organization. It is managed by different type of cloud middleware's and each them have their own mechanism and protocols. So there is an interoperability issue between these different type of private clouds, to solve this issue it is essential to describe a common mechanism. In this paper, we have devised a a broker based architectural framework to solve the interoperability issue between the Eucalyptus and OpenNebula based private clouds. The proposed work has incorporated with semantic based resource description and discovery, capacity based resource selection and resource provisioning mechanism. The proposed framework solves the interoperability between private clouds, enhances the efficiency of cloud resources, increases the scheduling success rate resulting in increase of throughput of application requests submitted to the resource broker in a better manner.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133141778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}