{"title":"Dynamic Adaptive Cross layer mapping mechanism for video transmission over wireless networks","authors":"Dharm Singh, Heena Rathore, C. Ke","doi":"10.1109/ETNCC.2011.5958517","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958517","url":null,"abstract":"The increase of IEEE 802.11's bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose rigorous discipline constraints in QoS. To support the varying Quality-of-Service (QoS) requirements of emerging applications, the QoS-capable standard IEEE 802.11e [1] has been specified. Digital video delivered over wired-to-wireless networks is expected to suffer quality degradation from packet loss. Video traffic is widely expected to account for a large portion of the traffic in future hybrid network, as multimedia applications are becoming increasingly popular. Initially this paper attempted to discover optimal parameters such as bandwidth utilization and packet size in order to enhance video stream quality and proposed New Adaptive Crosslayer Algorithm, a novel scheme for QoS enhancement for IEEE 802.11 wireless networks.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125478213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saurabh Chamotra, J. S. Bhatia, Raj Kamal, A. Ramani
{"title":"Deployment of a low interaction honeypot in an organizational private network","authors":"Saurabh Chamotra, J. S. Bhatia, Raj Kamal, A. Ramani","doi":"10.1109/ETNCC.2011.5958501","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958501","url":null,"abstract":"This paper describes a case study of Honey pot deployment in an organizational network. As per Wikipedia “honey pot is a trap that is set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems” [05]. These traps could be any digital resource ranging from a single computer to a network of such computers or a network application that appears to be a part of organizational network resources but is actually a fake resource with no production traffic. Further these resources are closely monitored and the traffic to and from these resources is well under the control of the administrator. In the experiment performed in this paper, such a trap is laid in the form of a low interaction honeypot honeyd [01] in the perimeter security of an organizational network. The results of deployment are presented and further various props and cons of such deployments are brought about.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124130555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network density based analysis of Geographic Routing Protocol for random mobility of nodes in MANET","authors":"T. Raval, J. S. Shah","doi":"10.1109/ETNCC.2011.6255905","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255905","url":null,"abstract":"Mobile ad hoc network is a collection of self organized nodes. They form a temporary network without additional infrastructure like wireless access points. Such network does not have any centralized control. Here every node can communicate directly with other nodes in the network. Mobile ad hoc network communicate one to the other through broadcast radio transmissions, i.e., transmissions that reach all the terminals within the transmission power range. In recent years several routing protocols are developed for mobile ad hoc networks. Some of them are DSDV, AODV, TORA, DSR and GRP. This paper does the network density based analysis of Geographic Routing Protocol for random mobility of nodes in MANET. The simulation environment is created in Opnet 14.0.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124326314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Color image security based on random phase masks in Fractional Fourier Transform domains","authors":"M. Alam, S. Pandey","doi":"10.1109/ETNCC.2011.6255938","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255938","url":null,"abstract":"A random phase mask plays a significance role in encryption/decryption of color image. In this paper we are presenting a comparison between chaotic function and different random phase masks, which is used encryption decryption of color images, based on Fractional Fourier Transform (FRT). Random The different fractional orders and random phase masks used during the process of encryption and decryption are the keys to enhance the security of the presented system. The mean square error between the decrypted image and the input image for the correct order and the incorrect order of the fractional Fourier transform has also been calculated.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122644371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study to identify poverty as a key factor to less enrolments in higher education in West Bengal: E-learning and e-monitoring as best way out to increase GER","authors":"Subir Gupta, Anirban Das, Mauparna Nandan, Priyabrata Bandyopadhyay","doi":"10.1109/ETNCC.2011.6255918","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255918","url":null,"abstract":"In accordance with the survey data of higher education department of West Bengal, the gross enrollment ratio of West Bengal in Higher education is only 26.23%. Major parts of the drop out students are showing reason of poverty even while making them understood about the effectiveness of higher education through e-learning. In this paper an approach is followed through which poverty is determined as a significant factor along with other factors in less enrollments in higher education in West Bengal and allocation of funds through e-monitoring based on web enabled applications may be one of the best solutions to remove poverty so that the already dropped out candidates or candidates just going to be dropped out can be lessen and gradually the GER (gross enrollment ratio) in higher education of West Bengal can be increased.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121140550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ear as a platform for latest biometric solution","authors":"Aakanksha, H. Setia","doi":"10.1109/ETNCC.2011.6255929","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255929","url":null,"abstract":"Currently security has become one of the most widely researched areas and a lot of newer inventions are being added to it. This paper stresses on the use of ear biometrics for the same purpose based on the fact that ear is the least affected body part in terms of physical changes taking place in the body due to environment and natural growth. The concept of skin reflectance is made to work within the safe range of the EM wave spectrum following the fact that there is 54% reflection from the skin and 8% from the fats under the skin. An ear imaging mechanism has been suggested along with the proper detection of the reflected light using photometer. This is followed by the calibration of the reflected spectrum and then using the same spectrum to portray an ear uniquely. Codes and algorithms are depicted for the programming of spectrometer and setting the threshold value as per the maximum permissible error.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129637304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speckle reduction in remote sensing images","authors":"N. Agrawal, K. Venugopalan","doi":"10.1109/ETNCC.2011.5958515","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958515","url":null,"abstract":"Speckle noise contaminates image content and thus detracts from image interpretation. Speckle noise is the grainy salt-and-pepper pattern present in radar imagery caused by the interaction of out-of-phase waves with a target. Speckle noise reduction is usually employed prior to further image analysis. The primary goal of speckle filtering is to reduce speckle noise without sacrificing information content. The ideal speckle filter should adaptively smooth speckle noise, retain edges and features, and also preserve subtle but distinguishable details, such as thin linear features and point targets. Various speckle filters have been devised due to their different purposes and different capacities. In the present paper we are analyzing median, Lee and Wiener2 filters for the sampled SAR images from ENVISAT, RADARSAT2, US Library Congress and comparing their performances statistically by analyzing quality parameters like data mean, standard deviation, kurtosis and skewness. The paper is concluded with visual quality comparison of the input images and de-speckled images.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134588952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance comparison between single wall carbon nanotube bundle and multiwall carbon nanotube for global interconnects","authors":"M. Majumder, B. Kaushik, S. Manhas","doi":"10.1109/ETNCC.2011.5958496","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958496","url":null,"abstract":"Multi-wall carbon nanotubes (MWNTs) have potentially provided an attractive solution over single-wall carbon nanotube (SWNT) bundles at deep sub-micron level very large scale integration (VLSI) technologies. This paper presents a comprehensive analysis of propagation delay for both MWNT and SWNT bundles at different interconnect lengths (global) and shows a comparison of area for equivalent number of SWNTs in bundle and shells in MWNTs. It has been observed that irrespective of the type of CNTs, propagation delay increases with interconnect lengths. For same propagation delay performance, the area occupied by SWNT bundle is more than the MWNTs for a specified interconnect length.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design, implementation and analysis of multi layer, Multi Factor Authentication (MFA) setup for webmail access in multi trust networks","authors":"S. Chaudhari, S. Tomar, A. Rawat","doi":"10.1109/ETNCC.2011.5958480","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958480","url":null,"abstract":"The obvious advantages of Multi Factor Authentication (MFA) — in terms of enhanced identity theft protection and account hijacking protection — have resulted in its large scale adoption in various security sensitive web applications. In large organizations with different authentication related security policies for Intranet, Extranet and Internet users, varying and multiple authentication implementations are required for achieving security compliance. Layered MFA setups have evolved to facilitate variable authentication implementations in secured web applications. Deploying and handling multi layered, multi factor authentication setups based on Open source freeware solutions is a challenging task for any administrator. This paper presents our work related to design, implementation and integration of a multi layered, multi factor authentication setup for securing the webmail application at our centre, using various freeware open source tools. The implementation ensures fulfillment of varying authentication requirements for Intranet, Internet and Extranet webmail users. Detailed analysis of the implemented setup in terms of compliance to authentication related security policies of our centre have also been presented.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130075043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ant-CAMP: Ant based congestion adaptive multipath routing protocol for wireless networks","authors":"C. Raval, S. Hegde","doi":"10.1109/ETNCC.2011.6255882","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255882","url":null,"abstract":"The advent of mobile computing devices and wide deployment of wireless networks have led to an exponential increase in the internet traffic. Long congestion epochs and frequent link failures in wireless network lead to more number of packets being dropped and incur high end-to-end delay, thereby degrading the overall performance of the network. Congestion control, though mainly incorporated at the transport layer, if coupled with the routing protocols, can signif-icantly improve overall performance of the network. In this paper we propose Ant based Congestion Adaptive Multipath (Ant-CAMP) routing protocol that aims to avoid congestion by proactively sending congestion notification to the sender. The proposed Ant-CAMP routing protocol is implemented in Network Simulator-2 (NS-2) and its performance is compared with Ad-hoc On Demand Multipath Distance Vector (AOMDV) in terms of Packet Drops due to Congestion, Packet Delivery Fraction and Average End-to-End Delay.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125450596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}