{"title":"Extraction and Verification of Mobile Message Integrity","authors":"R. Verma, D. Tomar, S. Rathore","doi":"10.1109/CSNT.2011.17","DOIUrl":"https://doi.org/10.1109/CSNT.2011.17","url":null,"abstract":"Crime investigation in mobile phone is an important source of data acquisition. Offenders tamper Mobile phone technology is increasing rapidly. Now companies are expanding their horizon through mobile message services, making it essential. On other hand tight physical and border security may encourage criminals to use mobile SMS to communicate suspicious data. Message contents to effect message integrity. In this work common mobile phone attacks, SMS encoding and decoding techniques are presented. A prototype system is also implemented to verify the message integrity.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133931432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Garg, Rahul Tiwari, Ashish Kumar, Tilak Chitransh
{"title":"Design of Factored \"X\" Shaped Metamaterial Structure for Enhancement of Patch Antenna Gain","authors":"B. Garg, Rahul Tiwari, Ashish Kumar, Tilak Chitransh","doi":"10.1109/CSNT.2011.57","DOIUrl":"https://doi.org/10.1109/CSNT.2011.57","url":null,"abstract":"This paper introduces some of the basic concepts of Patch Antenna. The main focus will be on explaining the general properties of Rectangular Micro strip Patch Antenna by using the Metamaterial Structure. It will cover topics including: principles of operation, Impedance Matching, Return Loss, VSWR and Smith Chart. The Return Loss of simple Rectangular Micro strip Patch Antenna alone and with Metamaterial Structure are compared. It has been seen that Return Loss improved around 10dB. Which ultimately improves the directivity of Rectangular Micro strip Patch Antenna.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132725416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Moving Base Station Strategy Using Fuzzy Logic for Lifetime Enhancement in Wireless Sensor Network","authors":"Abhijeet Alkesh, Ashutosh Kumar Singh, N. Purohit","doi":"10.1109/CSNT.2011.49","DOIUrl":"https://doi.org/10.1109/CSNT.2011.49","url":null,"abstract":"Lifetime enhancement has always been of crucial importance for wireless sensor network due to resource limitations of sensor nodes. In the recent past some researchers have suggested moving base station method to enhance the lifetime of wireless sensor network. However the movement of base station in sensor field is a complex problem and practically may not be feasible. In this paper, we propose a unique movement strategy for base station to reduce energy consumption. The motion of base station is governed by fuzzy logic inference mechanism. The strategy used in this paper is unique in the sense that the base station is allowed to move only on a predefined path making it practically more feasible. Final results are compared with the method having stationary base station and method in which motion of base station is governed by fuzzy logic inference mechanism but without following any predefined path. Simulation results show that our strategy enhances lifetime by a significant amount as compared to stationary base station. We further propose that by increasing or decreasing area covered by predefined path we can get desired lifetime intermediate between the above two approaches.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133223906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Left Ventricular Segmentation of 2-D Echocardiographic Image: A Survey","authors":"Shweta Deopujari, Yogita K. Dubey, M. Mushrif","doi":"10.1109/CSNT.2011.120","DOIUrl":"https://doi.org/10.1109/CSNT.2011.120","url":null,"abstract":"Cardiovascular diseases are a major health concern worldwide. The left ventricle and in particular the endocardium is a structure of particular interest since it performs the task of pumping oxygenated blood to the entire body. Therefore, segmentation of the left ventricle in echocardiography images is a task with important diagnostic power. More concretely, contour extraction is an important criterion for subjective evaluation of the cardiac function and has become an area of focus. Cardiac function is evaluated quantitatively using echocardiography via the analysis of shape attributes, such as the heart wall thickness or the shape change of the heart wall boundaries. This requires that the complete boundaries of the heart wall be detected from a sequence of two-dimensional ultrasonic images of the heart. The image segmentation process is made difficult since these images are plagued by poor intensity contrast and dropouts caused by the intrinsic limitations of the image formation process. Current studies often require the tedious and time-consuming practice of having trained operators manually trace the heart walls. This paper reviews Left ventricular segmentation methods of 2-D echocardiographic image, in a broad sense.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124587015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Comparison of Performance of TCP-Vegas in MANET","authors":"P. K. Meher, P. Kulkarni","doi":"10.1109/CSNT.2011.21","DOIUrl":"https://doi.org/10.1109/CSNT.2011.21","url":null,"abstract":"Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (MN) that communicate using wireless links with no support from any pre-existing infrastructure network. Packets are delivered from a source to a destination using packet forwarding capabilities of intermediate nodes. Therefore, MNs act as end systems or routers. The purpose of this paper is to analyze and compare the different congestion control and avoidance mechanisms which have been proposed for TCP/IP protocols. TCP is a reliable connection oriented end-to-end protocol and used in MANET for the purpose of smooth integration with the wired network. TCP-Vegas is well-known transport protocol which takes into account existing network conditions. This paper presents effectiveness of the TCP-Vegas with reference to other TCP variants. Through simulations using ns-2, it was observed that packet loss in network using TCP-Vegas is less as compare to other TCP variants. The paper suggests some improvements for better performance.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114437006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Ontology-based Description of Temporal Services Interfaces in Asynchronouly Communicating Services","authors":"A. Bhandari, Manpreet Singh","doi":"10.1109/CSNT.2011.69","DOIUrl":"https://doi.org/10.1109/CSNT.2011.69","url":null,"abstract":"Ontologies are the formal representation of entities, and events along with their relation and the attributes within the scope of a domain. WSML is one of the languages used to represent the formal ontology and for visualizing the ontologies represented in WSML, WSMO is used. We've discussed the architecture of the services and their communications in a hypothetical organization named SMAL. Also, the services hosted at the infrastructure of SMAL organization are collectively referred to as SMAL Services. The temporal characteristics of the SMAL Services are extended in this paper, and further represented and visualized using web-services modeling ontologies (WSMO). The semantic-based model for the ontologies and services identified in the system are presented in this paper. Also, we specify the temporal characteristics and constraints of the system using WS-Policy Language (WSPL).","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RRDD: Reliable Route Based Data Dissemination Technique in VANETs","authors":"Brij Bihari Dubey, N. Chauhan, Sudhanshu Pant","doi":"10.1109/CSNT.2011.38","DOIUrl":"https://doi.org/10.1109/CSNT.2011.38","url":null,"abstract":"In the vehicular Ad Hoc Network (VANETs) data dissemination is very important issue among the researchers and efficient data dissemination is very critical for some applications. In this paper we are presenting reliable route based data dissemination technique which sends the packet using exact route to destination to achieve efficient data delivery ratio and minimum packet drop. It also reduces the total number of packet that are moving in the network in comparison to the flooding based data dissemination. Simulation results demonstrates that the proposed protocol reduces congestion in the dense traffic region and efficiently utilizes the bandwidth in stressful road scenarios.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124500233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Neeraj Khanna, J. Nath, Joel James, Sayantan Chakraborty, A. Chakrabarti, A. Nath
{"title":"New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm","authors":"Neeraj Khanna, J. Nath, Joel James, Sayantan Chakraborty, A. Chakrabarti, A. Nath","doi":"10.1109/CSNT.2011.33","DOIUrl":"https://doi.org/10.1109/CSNT.2011.33","url":null,"abstract":"In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors introduced new bit manipulation method for data encryption and decryption of any file. Nath et al already developed some symmetric key methods[1,2,3,4] where they have used some randomized key matrix for encryption and decryption methods. In the present work the authors have used a bit manipulation method which include bit exchange, right shift and XOR operation on the incoming bits. To exchange bits the authors used a randomized key matrix of size (16x16) using the method developed by Nath et al(1). The present method allows the multiple encryption and multiple decryption. To initiate the encryption process a user has to enter a text-key which may be maximum of 16 characters long. From the text-key the authors have calculated randomization number and the encryption number. The method used was developed by Nath et al(1). A slight change in the text-key will change the randomization number and the encryption number quite a lot. Multiple encryption using bit exchange, bit right shift and XOR operations makes the system very secured. The present method is a block cipher method and it can be applied to encrypt data in sensor network or in mobile network. The advantage of the present method is that one can apply this method on top of any other standard algorithm such as DES, AES or RSA. The method is suitable to encrypt any large or small file. There is a scope to further enhance the present method of encryption.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125791236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FF Based Instrumentation and Control System for Turbine Test Laboratory","authors":"V. Shah, H. K. Verma, M. Dewal","doi":"10.1109/CSNT.2011.89","DOIUrl":"https://doi.org/10.1109/CSNT.2011.89","url":null,"abstract":"An integrated instrumentation and control (I&C) solution based on Foundation Field bus (FF) network is proposed for turbine model test laboratory. The main benefits of the FF are discussed in comparison with other popular networking protocol. Pilot SCADA system based on FF has been developed by using necessary tools and softwares having major functionalities similar to the proposed full scale system.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128553547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dispersion Analysis of a Microstrip Line at Higher Frequencies by Using Sonnet and Matlab","authors":"S. Sable, Puran Gour","doi":"10.1109/CSNT.2011.52","DOIUrl":"https://doi.org/10.1109/CSNT.2011.52","url":null,"abstract":"This paper we mainly emphasize on simulation & synthesis of micro strip line by using powerful simulation tools like sonnet and matlab. Many researchers have investigated the dispersion characteristics of micro strip lines at different higher frequency range. This paper we analyzed the micro strip line with characteristic impedance 50Ù at frequency range 1 to 20GHz for Alumina, Gallium Arsenide and Silicon substrate materials. All parameters of the micro strip lines are exactly determined from the empirical formula of micro strip line. Here we compare the results of the dispersion formulas on the software tools.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128893592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}