{"title":"Comparison of characterizing and data analysis methods for detecting abnormalities in ECG","authors":"Veena N. Hegde, R. Deekshit, P. Satyanarayana","doi":"10.1109/AHICI.2011.6113950","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113950","url":null,"abstract":"The electrocardiogram (ECG) is an important bioelectrical signal which gives valuable information about the functional aspects of the heart both in normal and abnormal conditions. For several decades a considerable amount of research activity has been directed towards advancement in the clinical diagnosing of this disease using surface ECG and symptoms. This paper compares different methods that have evolved over the years for elimination of different types of noise present in ECG and for characterizing ECG for the detection of myocardial ischemia and infarction which is a life threatening heart disease. The first part of the review gives broad overview of the research undergone in the area of denoising methods deployed and second part describes different types of ischemia and methods to detect the disease using ECG.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134480213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Subash, M. Manohar, Nikita V. Patil, S. Shylaja, N. Parimala
{"title":"Co-operative media streaming in mobile environments","authors":"C. Subash, M. Manohar, Nikita V. Patil, S. Shylaja, N. Parimala","doi":"10.1109/AHICI.2011.6113926","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113926","url":null,"abstract":"Media streaming in mobile environments is becoming more and more important with the proliferation of 3G technologies and the popularity of online media services such as news clips, live sports, and movies. To avoid disconnection and/or service breakdown when the users keep moving, proper data management strategies must be taken by all parties. We propose a two-level framework and a set of new techniques for cooperative media streaming in mobile environments. Headlight prefetching is designed for the cooperation of streaming access points to deal with the uncertainty of client movement and the requirement of seamless service handoff. Dynamic chaining is for the cooperation among mobile users to maximize cache utilization and streaming benefit. On receiving a media segment request from a mobile client, the streaming access point starts a search for possible supplying partners before attempting to a remote media server","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122968724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three Tier Verification Technique to foil session sidejacking attempts","authors":"Vinay Kumar","doi":"10.1109/AHICI.2011.6113928","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113928","url":null,"abstract":"Session sidejacking is the term used to describe the theft of cookies used to authenticate the user to a web server. Session sidejacking attack is a form of session hijacking where the hacker uses packet sniffers to listen to the traffic between the client and server to steal the session cookie. Most of the websites use Hypertext Transfer Protocol Secure (HTTPS) only for Login purpose in order to protect the user name and password. However they revert back to Hypertext Transfer Protocol (HTTP) after this and all the cookies which are used to authenticate the user are sent to the server over an unsecure HTTP connection. Any hacker listening to this network using a packet sniffer can copy the cookies and use them to impersonate the victim and carry out activities on his behalf. Though the hacker won't know the password of the victim but he can still act on victim's behalf. A three tier session verification technique which is impervious to Session sidejacking is being proposed here. This technique allows the use of HTTP protocol and still protects the users from session sidejacking, however it assumes that the server uses a secure HTTPS connection for login purposes to avoid transmission of password in the clear. This technique uses a feature of Hyper Text Markup Language Version 5 (HTML5) called “local storage” to overcome the vulnerabilities of cookies and it foils any attempt to sidejack a session. This technique can be implemented using server side logic and client-side JavaScript.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124241546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Migration of TDM network into NGN for the Fixed Wire-line access Network","authors":"Subodh Paudel","doi":"10.1109/AHICI.2011.6113932","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113932","url":null,"abstract":"This paper outlines the telecommunication network evolution from copper based technologies to fiber based next generation network (NGN). In addition, some practical issues are addressed, for instance migration from Time Division Multiplexing (TDM) network to Internet Protocol (IP) network, transformation from circuit switch network to packet switch network, and network design with under the NGN architecture. A case study of optical access network design and architecture at Nepal Telecom (NT) is done to perform the migration of TDM into NGN for the Fixed Wire-line Network.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121517445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A superposition modulation based cooperative transmission scheme in regenerate-and-forward relaying networks","authors":"Chia-Yang Chiang, S. C. Jha, V. Bhargava","doi":"10.1109/AHICI.2011.6113956","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113956","url":null,"abstract":"Since classical time-division-multiple-access based cooperative scheme suffers from lower data rate due to two time-slots based transmission approach, superposition modulation has recently gained huge research attention which enables single time-slot cooperative transmission. Therefore, in this paper we propose a novel superposition modulation based regenerate-and-forward cooperative transmission scheme with M-ary phase shift keying constellation signals. Closed-form expressions for average symbol error probability (SEP) and maximum power allocation for relay data are derived for proposed scheme. Simulation results show that proposed scheme outperforms classical cooperative scheme by providing higher spectral efficiency and lower SEP.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131424234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of jitter control algorithms in QoS networks","authors":"S. Jagadish, R. Manivasakan","doi":"10.1109/AHICI.2011.6113947","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113947","url":null,"abstract":"The key focus of our work is to analyse some jitter control algorithms. We study a jitter control algorithm proposed by Mansour et. al [1] for networks with guaranteed quality of service (QoS) from a competitive analysis point of view. The authors have analysed the proposed algorithm (on-line algorithm) and also compared its performance to the off-line algorithm. In this paper, the analysis of the on-line algorithm has been dealt with rigorously and relevant conditions have been derived. For delay jitter, we show that the on-line algorithm guarantees the same delay jitter as the off-line algorithm. Also, both the algorithms in their original forms are applicable only to a fixed number of packets. We extend the results to a more practical model in which we compare the off-line algorithm with n packets and the on-line algorithm with n1 (n1 > n) packets, arrival times for both the stream of packets being realised from the same statistical model. In this case, we show that there exists a expression for the ratio of buffer size needed in the off-line algorithm to the buffer size needed in the on-line algorithm, provided that the delay jitter in both the cases are equal.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130516300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric secured mobile voting","authors":"Donovan Gentles, S. Sankaranarayanan","doi":"10.1109/AHICI.2011.6113931","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113931","url":null,"abstract":"Voting process in today's era is behind its time as it relates to the involvement of technology. The voting process is been fully manual and paper based. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related systems were developed to resolve some of these issues like Electronic based voting that is been actively used for voting in countries like India and so. However these systems were still prone to electoral frauds and voters has to make tremendous effort in order to cast their ballots. With that said, there are a few very important areas which were identified that need to be addressed. These issues include Security which involve person be able to vote in secure manner, Time spent for voting by voters, Efficiency in counting of votes and Cost involved in employing manual people for voting. So taking the above into consideration we here have come with Biometric secured mobile voting technique that will address these issues. This is a novel technology and also first of its kind at present. Using fingerprint based biometric control information and encryption [1][2] along with SSL using VeriSign [3] would make the software involved in the voting process well secured. In addition tying the credentials to a mobile device will make the system even more robust. The mobile equipment that will be used for development of the system will be in the form of a smart phone using Android 3.0 (Honeycomb [4]. The details are presented in the paper.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122820549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Problems and prospects of internet in new e-Nepal","authors":"H. Dhungana, S. Sah, Saroj Shakya, N. Pradhan","doi":"10.1109/AHICI.2011.6113942","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113942","url":null,"abstract":"This paper is intended to provide knowledge of development of internet technologies in Nepal. It also depicts the current situation and facing challenges by our society and gives the future potential for supporting different aspects of social elements that can be beneficiated by use of internet. In the era of information super highway people around the world are making their lives more comfortable. This helps them in saving time and money and invoking improved service delivery. We the people of Nepal want our government to be more accountable more committed to people's right that's why we need e-Governance. The promise of e-Government is that it will be able to improve governance through citizen empowerment and participation, better delivery of government services, more efficient management, less corruption, more transparency, greater convenience, increased revenue, and reduced costs.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126939844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EECR: Energy efficient clustering and routing approach for wireless sensor networks","authors":"Kyuhong Lee, Heesang Lee","doi":"10.1109/AHICI.2011.6113941","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113941","url":null,"abstract":"Energy efficiency is a critical factor for operation of a wireless sensor network. In general, wireless sensor networks perform clustering and routing using localized neighbor information and simple rules only. In this paper, we propose an energy efficient clustering and routing method for wireless sensor networks by exploiting energy state information of neighbor sensor nodes for selection of cluster heads. We compared the performance of the proposed method with that of a well known clustering and routing protocol. Our computational experiments demonstrate that the lifetime and distribution of energy consumptions of the proposed method are better than those of the compared method.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133577188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Divya Sambasivan, Nikita John, Shruthi Udayakumar, Rajat Gupta
{"title":"Generic framework for mobile application development","authors":"Divya Sambasivan, Nikita John, Shruthi Udayakumar, Rajat Gupta","doi":"10.1109/AHICI.2011.6113938","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113938","url":null,"abstract":"With the paradigm shift of applications from desktop to hand held devices, the number of mobile operating systems or platforms emerging, is enormous. Since each platform has its own architecture and interfaces, developing applications for multiple platforms is a tedious and daunting task for any mobile application developer. A framework for developing cross platform applications has become the need of the hour. This paper presents one such framework that enables the development of applications that can run on Android, BlackBerry and iOS platforms. The framework enables the developer to implement his logic in a single language. It takes care of redirecting the calls to the respective native APIs. The paper describes the features and functionality of the framework. The framework has been developed and is currently being used to build cross platform applications.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115950271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}