emerging trends in computing
TRANSCRIPT
Proceedings of Second National Conference on
Emerging Trends in Computing
13th - 15th June, 2013
Organized by
Department of Computer Science & Engineering
Government Engineering College, Thrissur, Kerala
Sponsored by
TEQIP Phase II
Published by
Proceedings of Second National Conference on Emerging Trends in Computing - NCETIC- 2013
Copyright © 2013 by Bonfring. All rights reserved. Authorized reprint of the edition published by Bonfring. No part of this
book may be reproduced in any form without the written permission of the publisher.
Limits of Liability/Disclaimer of Warranty: The authors are solely responsible for the contents of the paper in this volume. The
publishers or editors do not take any responsibility for the same in any manner. Errors, if any, are purely unintentional and
readers are required to communicate such errors to the editors or publishers to avoid discrepancies in future. No warranty
may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable
for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or
other professional services. If professional assistance is required, the services of a competent professional person should be
sought. Further, reader should be aware that internet website listed in this work may have changed or disappeared between
when this was written and when it is read.
Bonfring also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in
electronic books.
ISBN 978-93-82338-64-2
Bonfring
292/2, 5th Street Extension, Gandhipuram,
Coimbatore-641 012.
Tamilnadu, India.
E-mail: [email protected]
Website: www.bonfring.org
Preface
The Second National Conference on Emerging Trends In Computing 2013 (NCETIC 13)
is being organized by Department of Computer Science & Engineering of Government
Engineering College, Thrissur under the sponsorship of TEQIP Phase II. The conference
addresses various challenges emerging in the fields of Computer Science and Electronics.
This conference provides a platform for Engineers, Academicians and Researchers to
present their new findings as papers, share and exchange innovative ideas among the
participants and to the eminent professors.
I hope this proceeding will be an asset for the research and academic community of the
country.
I take this opportunity to acknowledge the sponsor of the event, the great project of GoI,
TEQIP II which changed the face of technical education of the country.
Prof. K V Manoj Kumar
Organizing Secretary
NCETIC 13
About College
Government Engineering College Thrissur (GECT) established in 1958 is one of the
premier Engineering Institutes in the country. The foundation stone being laid by Pandit
Jawaharlal Nehru makes it one of the oldest engineering colleges in the state of Kerala. The
institute is well associated with the industry. GECT provides world class education bridging
the gaps in technical education and developing competency in the frontier areas of
engineering studies. The curriculum also aims to create technically sound students with
multiple skills. The college comes under the academic purview of the University of Calicut.
GECT has been able to establish linkages with the industries in the region and also
elsewhere in the country. Many of the alumni occupy top management and key technical
positions in industries and government organizations within the country and abroad.
Computer Science and Engineering department started in the year 1984. It is one of the
oldest departments in this field in Kerala and since its inceptio n it has been keen in
producing professionals of unmatched quality.
About Department
Computer Science and Engineering Department started in the year 1984. It is one of
the oldest departments in this field in Kerala and since its inception it has been keen in
producing professionals of unmatched quality. Courses offered by the department ar e
B.Tech in Computer Science and Engineering (regular, Part time) and M.Tech in Computer
Science and Engineering.
About Conference
National Conference on Emerging Trends in Computing NCETIC- 2013 will be held
during 13-15 June 2013 at Department of Computer science and Engineering, Government
Engineering College Thrissur, Kerala India. NCETIC is to bring together innovative
academicians and industrial experts in the field of Computing.
The aim of this conference is to provide an interdisciplinary forum for researchers,
engineers and students to discuss the emerging trends in the area of computing. The
impact of computing can be seen in almost all walks of life making things easier for us. Thus
the trends in computing require greater attention from a research perspective. The
conference would provide a platform for engineers, academicians and researchers to
present their new findings as papers, share and exchange innovative ideas among the
participants and to the eminent professors. The conference will include invited talks and
paper presentation sessions. It will provide excellent opportunities for the presentation of
interesting new research results, modern approaches and discussion about them, leading
to knowledge transfer and generation of new ideas. This would provide an opportunity for
the participants to explore the current trends in computing.
Advisory Committee
Dr. S.D. Madhu Kumar, Professor and Head, Department of Computer Science and Engineering, NIT
Calicut
Dr. Priya Chandran, Professor, Department of CSE, NIT Calicut
Dr.N.K. Narayanan, Professor, School of Information Science & Technology, Kannur University
Dr. Sukesh Kumar, Mentor, TEQIP II, GEC Thrissur
Dr.P.C. Reghu Raj, HOD, CSE, GEC Sreekrishnapuram, Palakkad
Dr.V. Kabeer, HOD, CSE, Farook College, Kozhikode
Dr. V.S. Sheeba, Professor, ECE, GEC Thrissur
Dr.N. Sajikumar, Assoc. Professor, Department of Civil Engineering, GEC Thrissur
Dr.E.A. Jasmin, Asst. Professor, Department of EEE, GEC Thrissur
Organizing Committee
Patron
Dr.J. Letha, Director of Technical Education, Govt. of Kerala
Chairman
Dr.K. Vijayakumar, Principal, GEC Thrissur
Program Chair
Prof. K.S. Valsaraj, HOD, CSE, GEC Thrissur
Organising Secretary
Prof. K.V. Manoj Kumar, CSE, GEC Thrissur
Programme Committee
Mrs.K.J. Helen, Assoc. Professor, CSE, GEC Thrissur
Mrs.M. Jayasree, Asst. Professor, CSE, GEC Thrissur
Organizing Committee
Mrs. Shibily Joseph, Asst. Professor, CSE, GEC Thrissur
Mr.E.D. Dileesh, Asst. Professor, CSE, GEC Thrissur
Mr. Ajay James, Asst. Professor, CSE, GEC Thrissur
Mrs.N.D. Bisna, Asst. Professor, CSE, GEC Thrissur
List of Reviewers
Mr.K.V. Manoj Kumar, Professor CSE, GEC Thrissur
Mr. K.S. Valsaraj, Assoc. Professor, CSE, GEC Thrissur
Mrs. K.J. Helen, Assoc. Professor, CSE, GEC Thrissur
Mrs. M. Jayasree, Asst. Professor, CSE, GEC Thrissur
Mrs. Shibily Joseph, Asst. Professor, CSE, GEC Thrissur
Mr. E.D. Dileesh, Asst. Professor, CSE, GEC Thrissur
Mr. Ajay James, Asst. Professor, CSE, GEC Thrissur
Content
S. No. Title of the Paper Page No.
1 Comparison of Demodulation Methods, Estimation and BER Computation of QAM/OFDM System Under Fading Channel
K. Rekha, V. Satheesh Prabhu and K.G. Satheesh Kumar
1
2 Prevention and Detection from Unauthorized Access using Firewall Policies
Nithu Lawrance and S. Revathy
5
3 Review and Suggestions of Time Variant Key (Automatic Variable Key) Techniques
Rajat Subhra Goswami, Swarnendu Kumar Chakraborty, Abhinandan Bhinia and Chandan.T.Bhunia
12
4 Aggressive Packet Combining Schemes: Review
Swarnendu K Chakraborty, Rajat S Goswami, Abhinandan Bhunia and Chandan T Bhunia
16
5 Performance Analysis of TMR Architecture with Voter Circuit
C.J. Rosemin, Divya S. Menon and Anumol B. Chennattucherry
21
6 Implementation of Digital Costas Loopand Bit/Frame Synchronizer for BPSK Demodulation
Sherly Joy, R. Nivin and T.R. Roshna
25
7 Dynamic Resource Allocation for Cloud Using Virtual Machines and Providing Green Computing
Binney Susan Mathai and D.R. Shashi Kumar
30
8 Machine Learning Algorithms in Network Traffic Classification
Justin Mathew and Alfred Thomas
34
9 Protecting Context Privacy in Wireless Sensor Networks
Rahul Gopal and Deepu Job
38
10 Face Recognition using Gabor Analysis and Local Binary Pattern
Meera Miranda Mathews and Jinu Thomas
41
11 Image Retrieval: Providing Query by Image Content
Neethu Alex and V.M. Praseetha
45
12 Contrast Enhancement of X-Ray Images Using Adaptive Neighborhood Method
Naveena Tresa Joseph and Kishore Sebastian
48
13 Digital Hearing Aids with Non Alias Adaptive Sub Band Filters
Rekha G Nair
51
14 Role of GIS in Ground Water Flow Modelling
R. Krishnapriya and K.O. Vargheese
53
15 Application of Haar Wavelet Transform for Image Compression and Storage of Colour Information in Gray and Back
S. Renji
58
16 Obfuscating Server Client Programs against Reverse Engineering
Lim Jun Long, Vivek Balachandran, Sabu Emmanuel and Ng Wee Keong
66
17 Implementation of PCA Algorithm on ARM9 for Face Recognition
Anoop Thomas and P.A. Silpa
73
18 An Analysis of Multi Channel Pulse Coupled Neural Networks in Comparison with a Conventional Method for Colour Image Segmentation
N. Subhashini
77
19 Generation of Symmetric Face Training Samples and its Comparison using Correlation
Elizabeth Mathew, Renjitha Rajan and Dr.V. Praseedalekshmi
81
20 Object Tracking by Adaptive Background Modeling
R.S. Liji James, Divya and Dr.V. Praseedalekshmi
84
21 Recognition of CAPTCHA based on Forepart Prediction and Character-Adaptive Masking
T. Ramya and M. Jayasree
87
22 Analysis of Current Steganographic Techniques and its Applications
Alphy Joseph, A. Angel Rose and Rosmi Varghese
92
23 Improving File Transfer Reliability by Markov Transfer
Vivek Thachil and E.D. Dileesh
99
24 LZW Data Compression Algorithm on CUDA
K. Shyni and K.V. Manoj Kumar
102
25 Time Complexity Classes, Their Scope, Recent Trends and Advances
Vivek Thachil and K.J. Helen
107
26 Multi-Lingual Multi-Category Sentiment Classification
Jenny Johny, Miphy Tom and Sruthi N Paul
119
27 A Fast and Accurate Approach to Bone Age Estimation
Geethu Sasidharan, Anupama George and Gemini George
122
28
A Study on Various Attacks And Security Management Service System for Wireless Network Environment
D. Mahalakshmi, D. Vaishnavi and Anita George
127
29 Assessment of Vulnerability to Groundwater Pollution using GIS Based DRASTIC Model
T.S. Shoy and Dr.K.S. Sumam
130
30 Drought Vulnerability Assessment Using Meteorological Drought Indices with the Help of GIS Tools: A Case Study of Palakkad District
S. Aparna and Vineetha Basil
136
31 Securing Wireless Sensor Network Using SDEP- Sensor Data Encryption Protocol
P. Prabu Rajkumar, Chinchu Glaison and Sujitha B Cherkottu
141
32 Automatic Identification of Salt-and-Pepper and Gaussian Noises and Their Removal in Grayscale and Color Images
R. Vivek and K.J. Helen
143
33 Jamming Attack Detection in Mobile Ad Hoc Networks
J. Ajana and K.J. Helen
150
34 Handling Exception Using Service Oriented Architecture
Vinod S. Pati and Pragati Patil
156
35 Analysis of Acoustic Signals in Friction Stir Welding
Allen Jose, A. Suresh Babu and V.S. Senthil Kumar
161
36 Availability Benchmarking for Cloud Computing
Antony T Jose and K.V. Manoj Kumar
165
37 Domain Dependent Aspect Based Sentiment Analysis using Relation Extraction and SVM Training
Raisa Varghese and M. Jayasree
168
38 Optimizing Grid Performance by Content Replication - A Feature Wise Analysis
R.J. Thara and S. Shine
172
39 Determination of Groundwater Level by Using Artificial Neural Network
Libin Babu and B. Thulasidharan
178
40 Solving Traveling Salesman Problem Using Genetic Algorithm and Particle Swarm Optimization Algorithm: A Comparative Study
R. Remya and Ajay James
183
41 Effective Visual Dictionary Creation by Sparse Coding
Manimegalai, S. VanithaSivagami and Dr.K. Muneeswaran
189
42 A Survey on Polynomial Time Reductions
Archana Kurian and Shibily Joseph
193
43 Distributed Parallel Data Intensive Computing for Scientific Applications
R S. Divya
197
44 Neural Network Approach for Automatic Sign Language Recognition
B.S. Ananthalekshmi, V.S. Deepanair, GayathriMohan and Dr.D. Devaraj
201
45 An Efficient Approach to Secure E-Tendering using Cryptography and Steganography
Shameela Sulaiman, Neenu Bose and Angel Rose
206
46 Power Quality Detection Algorithms Using Moving Window Technique
Anoop Thomas and Praiz Madappillil
211
47 A Survey on All-Pairs Shortest Path Algorithms
E.N. Hariprasad and Shibily Joseph
215
48 An Improvement to Bag of Words (BOW) Model Using Co-occurrence Feature
K. Soumya George and Shibily Joseph
221
49 Fast Parallel Arithmetic Coding on GPU
P.B. Jayaraj, Ajay Joseph Thomas, A.N. Aravind, Mohammed Hashir and K.S. Syam Sankar
224
50 Stream flow Estimation Using Geographic Information System
V.S. Ayana and K.O.Vargheese
229
51 Packet Analysis and Rule Generation using Snort and Hadoop
P.G. Prathibha and E.D. Dileesh
234
52 Modelling Water Harvesting System Using GIS-Based Hydrologic Model SWAT
Susan Mathew and V. Thulaseedharan
238
53 A Wavelet Enhanced ILD Detection Method Using Fuzzy SVM
P.S. Viji and M. Jayasree
242
54 Example Based Malayalam to English Machine Translation
E.S Anju and K.V. Manoj Kumar
247
55 Genetic Neuro Controller based Direct Torque Control of Switched Reluctance Motor
K. Sreejith and Lakshmi Menon
251
56 Dealing with NP-Completeness: A Survey Dealing with NP-Complete Problems
Arun Jacob and Shibily Joseph
261
57 GIS Integrated Hydrologic Modelling in Kurumali River Basin
M. Chithra and Dr.K.S. Sumam
264
58 Horizontal Aggregations and Integrating K Means Algorithms in SQL
C.C. Jaseela and Ajay James
268
59 Comparative Study on Solving TSP using A*, Genetic and Ant Colony Optimization Algorithms
I. Greeshma Aravind and Shibily Joseph
277
60 Grid Based Clustering for Mobile Ad Hoc Networks
B. Shobana and S. Rajeswari
283
61 A Study on NP-Completeness and Sudoku and Cloud Computing Problems as NP-Complete Problems
M. Karthi ka and Shibily Joseph
289
62 Coastal Vulnerability Assessment of Thrissur Coast, Kerala
Ponsy Paul and Dr.K.S. Sumam
293
63 Assessing the Effect of Industrial Effluent on the Chalakkudy River Using GIS Based Modelling
Sherjah P. Yusuf Ali and Dr.N. Saji kumar
298
64 Assessing the Effect of Industrial Effluent on River Using SWAT
Sajna Purakkat and Dr.P.T. Noushaja
304
65 Fusion of Digital Image Compression, Tampering and Authentication with Position Localization
R. Manasa and P. Bhuvaneshwari
309
66 Intelligent Adaptive Image Recognition and Information Retrieval Using Neural Network
B.M. Mangala and P. Bhuvaneshwari
315
67 Analysis of Meetings for the Automated Extraction of Interactions Using Semantic Sentiment Analysis
Achu Cyriac and Teena Thomas
321
68 Query by Image using Segmentation and K-Means Clustering
V.G. Neethu and Sonia Mary George
324
69 Hiding of Encrypted Text Files in Multimedia Files
Sanitha Sivanath and Prof. Ajay James
328
70 Generating Test Cases for Q-Learning Algorithm
Lavanya Kumaresan and Chamundeswari
334
71 Transform Domain Signal Analysis for Evaluating Linearand Mixed Signal Devices
K.J. Nelson and S. Assim
340
72 Multiphase Level Set Method for Image Segmentation in the Presence of Intensity Inhomogenity with an Application to Ultrasound
G.R. Vineetha and Gopu Darsan
346
73 Automatic Verification of Test Oracles in Functional Testing
T.R. Monisha and Chamundeswari
351
74 Design and Implementation of High Performance 64-Bit VLIW Microprocessor
K.J. Nelson, K. Adersh, K. Dilnavaz, Edwin Sebastian, Fahad Shameer Tharol, George John
355
75 Application of GIS for the Preparation of Landuse Map to Assess the Natural Groundwater Recharge of Karuvannur Watershed
Ginu S Malakeel and Prof. K.O.Vargheese
360
76 Proposed System for Data Hiding using Cryptography (Combination of Twofish and Serpent) and Steganography (LSB Substitution Method)
E. Shruthi and Ajay James
363
77 Automatic Identification of Salt-and-Pepper and Gaussian Noises and Their Removal in Grayscale and Color Images
R. Vivek and K.J. Helen
368
78 Improving English to Malayalam Statistical Machine Translator via Translation Memory
B. Nithya and Shibily Joseph
375