Icemc2 Advance Program

Embed Size (px)

Citation preview

  • 7/30/2019 Icemc2 Advance Program

    1/50

    ICEMC2 2007:

    Second International Conference on

    Embedded Systems,

    Mobile Communication and Computing

    August 3-5, 2007

    PESIT, Bangalore India

    Web: http://www.pes.edu/mcnc/icemc2/

    Organized by

    Mobile Communication and Networking Center of Excellence (MCNC)

  • 7/30/2019 Icemc2 Advance Program

    2/50

    Advance Program:

    2nd August 2007, Thursday:Tutorials, Workshops

    Day 1: 3rd August 2007, Friday

    8AM-

    9:30AMRegistration

    9:30AM-

    10AM

    Conference Inauguration, Opening Remarks

    10AM-

    10:45AMOpening Key Note Lecture

    10:45AM-

    11AMTea Break

    11AM-12PM

    Key Note Speech 1:

    12PM-

    1PMKey Note Speech 2:

    1PM-2PM Lunch

    2PM-

    3:30PM

    Paper Session 1A :

    Ad-hoc Networks:15, 21, 63, 64,114, 115, 145

    Paper Session 1B:

    Cellular Systems, Handover and

    Applications

    4, 34, 39, 77, 113, 125

    3:30PM-4PM Tea Break

    4PM-

    5:30PM

    Paper Session 2A:

    Embedded Systems

    13, 38, 89, 143, 166

    Paper Session 2B:

    Fuzzy Logic, Grid Computing and

    Location Based Services3, 55, 59, 70, 137, 180

  • 7/30/2019 Icemc2 Advance Program

    3/50

    Day 2: 4th

    August 2007, Saturday

    8AM-9:30AM

    Registration

    9:30AM-10:30AM

    Key Note Speech 3:

    10:30AM-

    11AMTea Break

    11AM-

    1PMPaper Session 3A:

    Multimedia and DSP:12, 16, 19, 49, 58, 69

    Paper Session 3B:

    Cryptography and Network

    Security

    5, 51, 62, 66, 74, 79

    1PM-2PM Lunch

    2PM-

    3:30PM

    Paper Session 4A:

    Multimedia and DSP:

    76, 102, 135, 136, 154

    Paper Session 4B:

    Cryptography and Network

    Security120, 96, 117, 146, 150

    3:30PM-

    4PMTea Break

    4PM-

    5:30PMPanel Discussion

    5:30PM-

    6PMSnack Break

    6PM-7PM Banquet Speech:

    7PM-9PM Cultural Program, Prize Distribution, Dinner

  • 7/30/2019 Icemc2 Advance Program

    4/50

    Day 3: 5th August 2007, Sunday

    8AM-

    9:30AMRegistration

    9:30AM-

    10:30AM

    Key Note Speech 4

    10:30AM-

    11AMTea Break

    11AM-

    1PM

    Paper Session 5A:

    Phy, Modulation, OFDM and

    Sensor Networks104, 161, 168, 133, 170

    Paper Session 5B:

    WLAN, Bluetooth and Network

    Performance11, 27, 29, 61, 67, 95, 124, 134

    1PM-2PM Lunch

    2PM-

    3:30PM

    Paper Session 6A:

    Poster20, 22, 25, 30, 31, 33,

    36, 37, 46, 68, 72, 85, 90

    Paper Session 6B:

    Poster91, 92, 101, 108, 110, 118,

    122, 140, 141, 152, 159, 175

    3:30PM-

    4PMTea Break

    4PM-5:30PM

    Conclusion

  • 7/30/2019 Icemc2 Advance Program

    5/50

    ICEMC22007 Key Note Lectures and Industry Presentations

    No. Speaker Title

    Opening Mr Sam Pitroda, Chairman, KnowledgeCommission, India

    Title to be confirmed

    Mr. Sam Pitroda is an internationally respected development thinker, telecom inventor and entrepreneur

    who has spent 40 years in Information and Communications Technology and related human and national

    developments. His experiences include working in the private and public sectors and working with

    governments around the world. A reputation built from many years of work, Sam Pitroda brings enormous

    professional weight and credibility to his projects and operations.

    Credited with having laid the foundation for and ushered Indias technology and telecommunications

    revolution in the 1980s, Mr. Pitroda has been a leading campaigner to help bridge the digital divide.

    During his tenure as Advisor to Prime Minister Rajiv Gandhi in the 1980s Mr. Pitroda headed six

    technology missions related to telecommunications, water, literacy, immunization, dairy and oil seeds. And,

    he was also the founder and first chairman of Indias Telecom Commission.

    Currently, Mr. Pitroda is chairman of Indias National Knowledge Commission which reports directly to

    the Prime Minister. The commissions mandate is to offer a series of recommendations to the government

    on access, concepts, creation, application and services related to knowledge to help build excellence in the

    education system to meet the challenges of the 21st century and increase India's competitive advantage.

    He owns close to 100 patents. He is widely regarded as one of the earliest pioneers of handheld computingbecause of his invention of the Electronic Diary in 1975. He was also among the pioneers in digital

    telephone switching technology in the late 1970s and early 1980s. The decade of 1990 saw Mr. Pitroda

    explore the world of mobile phone based transaction technology and telecom developments in emerging

    markets.

    Mr. Pitroda is also founder of the US based company, C-SAM, Inc. C-SAM provides a robust software

    platform for conducting secure payment and non-payment transactions in the physical and virtual world

    using a mobile device. C-SAM is committed to the vision of a digital wallet which is tightly integrated with

    value added services and applications and resides on a consumers mobile device.

    Key Highlights:

    Chairman of Indias Knowledge Commission

    Founder of C-SAM, Inc. Founding Chairman of Telecom Commission - Government of India

    Founder of several companies in the United States and Europe, including Wescom which was oneof the first digital switching companies in the world

    Owner of close to 100 worldwide patents, including the digital diary which was used bycompanies such as Casio, Sharp and Texas Instruments etc.

    Credited with having laid the foundation for and ushered in India's technology revolution in the1980s as Technology Advisor to the Prime minister of India

    Invited by the United Nations Secretary General to join a special committee to advise on globaldigital divide issues.

  • 7/30/2019 Icemc2 Advance Program

    6/50

    1

    Dr. Nalin Sharda, Victoria University,Australia

    Creativity and

    Innovation:

    The Key to ICT

    Advancement and Social

    Wellbeing

    SummaryCreativity and Innovation are the keys to continued advancement of human societies and their wellbeing.

    Information and Communication Technologies (ICT) have assumed a key role in the advancement of all

    societies today. Engendering the spirit of creativity and innovation is more important than ever before asinternationalization of industry and education takes hold; however, social structures, and educational

    paradigms used in most countries work against the spirit of innovation. Chris Stevens defines creativity as

    the ability to generate and use insight. To some extent everyone is capable of being creative; however,

    most people do not exploit their full creative potential, as they do not have a clear process to guide and

    sustain the flow of their creative juices. Joyce Wycoff says that innovation is a mental extreme sport;

    therefore, like all good sports persons, innovators need to train their body, mind and spirit to do it well.Wycoff adds that innovation requires pulling unrelated things together; thus, to innovate, one must have

    a wide range of interests, as a corollary narrow focused programs and courses hinder innovation. In this

    seminar we will investigate how creativity and innovation can be embedded in as an educational paradigm,

    and in particular for Information Technology education.

    PresenterProf. Nalin Sharda gained B.Tech. and Ph.D. degrees from the Indian Institute of Technology, Delhi.

    Presently he teaches and leads research in Multimedia and Internet Communications at the School of

    Computer Science and Mathematics, Victoria University, Australia. Dr. Sharda publications include the

    Multimedia Information Networking textbook, and around 100 papers and handbook chapters. Nalin has

    invented Movement Oriented Design (MOD) paradigm for the creation of effective multimedia content

    based experience, and applied it to e-Learning and other applications. Nalin is leading projects for the

    Australian Sustainable Tourism CRC, to develop e-Tourism using Semantic Web technologies, andinnovative visualisation methodologies. Nalin has been invited to present lectures and seminars in the

    Distinguished Lecturer series of the European Unions Prolearn program. He has presented over fifty

    seminars, lectures, and Key Note addresses in Austria, Australia, Finland, Germany, Hong Kong, India,

    Malaysia, Pakistan, Japan, Singapore, Sweden, Switzerland, UAE, and USA.

    For further details visit http://sci.vu.edu.au/~nalin/

    2

    Mr. Santosh V Patil, Symbian Software

    India Private Limited, Bangalore

    [email protected]

    Symbian OS: The

    Platform Security Model

    Details:

    1. Smartphones - Mobile communication & computing devices- Introduce smart phones (Mobile phone + PDA)- Rise in computing power, storage and capabilities (WiFi, GPS, Mobile TV)- Being projected as multimedia computing devices

    2. Potential Security Threats- Theft of personal info (contacts, messages, photos, video, wallets, etc)

  • 7/30/2019 Icemc2 Advance Program

    7/50

    - Identity hijacks (through theft of personal info)- Runaway billing (unauthorized calls, SMS)

    3. Symbian OS with Platform Security- Introduction to Symbian OS- Platform Security (overall initiative)- Mitigation of threats

    4. The Trusted Computing Model

    5. Capabilities & Data Caging

    6. Symbian Signed

    7. Q & A

    3

    Mr A Balaji, Midas

    Communications, Chennai, India

    Innovations in AffordableWireless Broadband Access

    Technology evolution in Wireless Access Networks and demand for Broadband Internet Services is moving

    forward rapidly. With increased competition among operators to attract subscribers, there is an increased

    need to choose a technology that differentiates him from others, in terms of contemporary services it offers

    to subscribers and the cost at which it is offered.

    In Wireless Access Networks, with the increased demand for spectrum, a technology which is spectrally

    efficient and can pack more bits/Hz is the key. On the other end, it should also be able to provide toll-quality voice, and all types of Internet services ranging from Voice over IP, Video on Demand, Multicast

    services like - Video conferencing, Internet Radio, and so on. Another major challenge in todays scenario

    with the wireless access technology is the rate of obsoleteness the time period after which the technology

    needs upgradation to support new services.Midas Communication Technologies building on its expertise of 15 years continues to innovate in

    affordable wireless technology solutions. corDECT (a DECT based Wireless Local Loop technology,

    providing Toll-Quality Voice and simultaneously 35/70 kbps Internet service) and BroadbandcorDECT

    (providing simultaneous Toll-Quality Voice and 256/512kbps Internet Service) are the result of these

    innovations.BroadbandcorDECT was developed by providing proprietary extensions to the standard ETSI DECT Protocol

    Stack (ETS 300-175 series) at Physical, MAC and DLC layers to provide a capacity of 2.88 Mbps

    (Uplink+Downlink) per carrier per sector, with a spectrum utilization of 1.66 bits/sec/Hz. It incorporates

    adaptive multi-level GFSK modulation (2/4/8 level modulation, which can carry 1/2/3 bits per symbol),Hybrid ARQ and Packet scheduling based on Channel Quality and link budget. This system also provides

    polarization diversity with selection between Horizontal and Vertical Polarization, adding to the time and

    frequency dimension. Fast Channel setup at the MAC layer (of the order of 20ms) ensures that the system

    can operate in Always ON mode where the network connections are retained logically while physical

    connections are suspended when there is no traffic. Further, MAC bearers can be increased or decreased

    to carry application payload.BroadbandcorDECT supports contemporary internet services such as Voice Over IP, Video On Demand,

    Multicast services, etc. System implements VLAN (802.1q, 802.1p), Multicast, Routed and Bridged mode of

    operation supporting PPPoE/DHCP mode of access, Security features such as ARP spoofing,

    Broadcast/Multicast Strom Control, Access Control List (ACL). To improve throughput system implements

    IP header compression and payload compression.BroadbandcorDECT architecture implements advanced end-to-end QoS (Quality of Service), for delivery of

  • 7/30/2019 Icemc2 Advance Program

    8/50

    delay and jitter sensitive applications. Apart from the regular policing and scheduling of traffic based on

    the class, the class is also mapped to the physical level service flows. The physical level QoS includes ARQ

    with various timeout to suit a particular application, and wireless traffic scheduling. These advanced QoS

    features provide real-time, non-real time, high reliable channels for delivery traffic from various Internetapplications.BroadbandcorDECT architecture is Internet Centric and also is future proof such that when air-interface

    bandwidth increases, the traffic can still be carried through by the same infrastructure, thus enhancing the

    Return On Investment (ROI) for the operator and reducing the Rate of Obsoleteness.

    In the process of continuous innovation, next in Product line BroadbandcorDECT NG supporting data rates of

    1 Mbps per subscriber uses reconfigurable RFIC and baseband platform allowing full compatibility with

    DECT to IMT 2000 evolution and beyond. Innovation in MAC architecture will allow intelligent

    multiplexing on a per session basis between ARQ and FEC schemes on the fly, purely based on SNR and

    CIR [Midas/IIT IPR].

    BioA. Balaji received his B.E. degree in Computer Science and Engineering from Madurai KamarajUniversity, India in 1993. He received his M.S. degree in Computer Science from the Indian Institute of

    Technology, Madras, India in 1999. He was employed by Future Software Pvt Ltd., Chennai, India during

    1993-94. While at IIT Madras he was working as Senior Project Officer for the corDECT project. Since

    1998, he has been with the Midas Communication Technologies Pvt. Ltd, Chennai, India as Manager. He is

    currently working for the BroadbandcorDECT project.

    4

    Mr Rakesh Radhakrishnan,

    Sun Microsystems, [email protected]

    Identity and Security for NGN

    Abstract:In this Keynote Rakesh will present the concepts behind how an Identity Centric Architecture acts as the

    Secure Policy Control Stratum Aligning Service Oriented Architecture (Service Signaling Stratum) with

    the Next Generation Network (Packet Handling Stratum). This will be based on his book that covers the

    strategic significance and synergy of Identity based Security for 4G Networks, Sensor Networks,

    Programmable Network, IMS Network and Service/Content Delivery Networks

    Bio:Rakesh Radhakrishnan is a Lead IT Architect in the Communications Market Area of Sun Client Solutions.

    He has covered Telecom Companies, Network Equipment Providers (NEP), Independent Software Vendors

    (ISV) and Service Provider accounts in Europe, Canada, USA and Latin America. He has over 15 years of

    experience and has an MBA (MIS) and MS (MIT). He is an active member of Customer Engineering

    Council (CEC) and was the Chairman of a Working Group on Container Alignment Engine (CAE patent

    received from Europe and US) at Sun. He also has pending patents on Correlated Identity. He has

    published more than 50 papers on IT Architectures (Frameworks, Process and Techniques) and is a

    frequent speaker in conferences including DIDW, OMG, TOG, CMG, IRM, SuperG, SunNetwork, Java

    ONE, etc. He has led multiple Architecture Workshops and Architecture Assessments for IT Consolidation

    and Network Identity projects. He was recently featured on Officer Outlook for his work on Aligning

    Architectural Approaches (Sun's WS-Incite Award for 2005). Rakesh is also the author of the upcoming

    book on "Identity and Security". Rakesh is also Certified by TOG (on TOGAF 8), SEI (as a SW Architect)

    and OGC (Prince 2 and ITIL). He has Green Belt Six Sigma training. He is a ECCSE (Enterprise

    Computing Certified Systems Engineer Competency 2000- from Sun ) and as a Systems Architect Pro

  • 7/30/2019 Icemc2 Advance Program

    9/50

    (from Peoplesoft). His blog can be found at http://identity-centric-architecture.blogspot.com/

    5

    Dr. Narendranath Udupa, Philips

    Software, Bangalore, IndiaCreating an InnovativeEnvironment

    Abstract:

    Some organizations are able to generate successful product and process innovations over and over again.

    An important part of their success, of couse, stems from the superior management processes and

    organizational structures they use to bring new ideas to market. This keynote covers the processes and

    structures followed in a typical organzation to create successful innovative environment. To begin with,Intellectual economy will be defined and the process of patent creation, and value extraction from patents

    will be shared. Salient features of a successful innovative organization will be presented. Story of a few

    historically bright ideas which failed to pay back the inventors due to timing reasons will be shared.

    Certain strategic methods used for generating innovative ideas will also be discussed. The attempt to reach

    out in the era of Open innovation will also be presented.

    Bio:

    Dr Udupa holds Ph.D and M.E. from IISc Bangalore and B.E. from MCE, Hassan, with over 20 years of

    rich work experience with 6 years in modeling and performance analysis of software intensive, resource

    constrained, systems including 15 years in modeling and control of real-time electrical systems in

    academic/research environment. He is currently Technology manager in Philips consumer electronics

    division, contributing to the development of inventions, idea creation, Plans and directs participation incompetency development and academic interactions. He has served as the technical lead for the team in the

    application of advanced theories, concepts, principles & processes for an assigned area of responsibility

    (subject matter, function, type of facility/equipment/product). He planned and directed research projects

    with full technical responsibility for interpreting, organizing, executing, and coordinating assignments He

    coordinated research and development activities between disciplines involving exploration of subject area,definition of scope and selection of problems for investigation, and development of novel concepts and

    approaches. He monitored the capacity, plans, develops, coordinates, and directs a number of large and

    significant projects or a project of major scope and importance.

    Significant Achievements;

    More than 35 invention disclosures in the area of Media Applications, Memory hierarchy, SoCPerformance, Scheduling and Image Security.

    14 Patent Filings in the area of memory hierarchy, SoC Performance, Scheduling, and ImageSecurity

    Recipient of the Golden Leaf Award (highest award in Philips Innovation Campus, Bangalore)for outstanding contribution to IP development.

    Recipient ofStar Performer Award for outstanding contribution to IP development

    Written 8 Technical Reports in the area of SoC architecture Performance, PerformanceVisualizer, Generic Performance Measurement Collection Framework, Models for Performance

    Prediction.

  • 7/30/2019 Icemc2 Advance Program

    10/50

    6

    Mr. Paul Jeong, L&T Infotech,

    Bangalore, India

    Title Not Available

    Abstract Not available

    7

    Mr. Ravinder Sabhikhi, IBM USA

    CTO AP, NGNDistinguished Engineer

    [email protected]

    NGN Revolution challenges and

    opportunities

    Abstract

    As the shift to all IP based networks takes place it brings some interesting set of challenges to Service

    providers and Network Equipment providers, The Telecom market is a dynamic market, currently driven by

    gaining consumer market share via attractive Services offerings. However just the introduction of services

    is no longer enough for differentiation in such a competitive market place. The value proposition is

    shifting from connectivity to the quality of experience and time-to revenue is becoming critical factors for

    differentiation. By leading these shifts, the internet vendors such as Google, Myspace.com, Skype, Yahoo,MSN etc. are taking bite out of the service providers revenue. These forces are driving major

    transformations in the Telecommunication industry which are rapidly changing the rules for competing.

    To differentiate, service providers really need to focus on strategic service areas with long term planning in

    place. The convergence of the telecom infrastructure toward a more open, IP-focused IT architecture is one

    likely scenario that will play out in the industry hence the need for deployment of applications such as IMS,IPTV, Rich Content, VoD, SDP etc. is much more essential at this point of time. The transition toward an

    IT-like structure where any application can run over many different types of network transport will

    revolutionize new service creation in the telco community.

    BiosRavinder Sabhikhi is a Distinguished Engineer at IBM. His current assignment is CTO for Next generation

    Networks for the Asia Pacific. He has over 25 years of experience in system architecture, design,

    developing and leading teams of engineers in the development of world class networking products.Ravinder holds several patents in the field of networking, he has received bachelors and masters in

    Computer Science and Masters in Business Management from NC State University USA.

  • 7/30/2019 Icemc2 Advance Program

    11/50

    International Conference on Embedded Systems, Mobile Communication and Computing, August 3-5, 2007, Bangalore India

    Message from Dr. Suthikshn Kumar,

    General Chair ICEMC2 2007

    Hi ALL

    I am glad to welcome you all to the ICEMC2 2007, Second International Conference on Embedded Systems, Mobile

    Communication and Computing, being held at PESIT, Bangalore India from August 3-5, 2007. This conference attempts to

    bring together professionals, programmers, researchers, academics and students to discuss latest innovations and technology

    trends in the Embedded systems, Mobile Communication and Computing domain.

    The First ICEMC2 2006, which was successfully held last year, generated enormous amount of interest from Industry and

    academics. Based on the participants feedback and organizers experience, we have planned for organizing the ICEMC2 2007.

    The World Congress on Lateral Computing ( WCLC) series of conferences is now merged with ICEMC2 series of annual

    conferences. The reputation built over by successfully organizing ICEMC2 and WCLC series of conferences has helped us

    attract expert speakers, high quality papers, co-sponsors, participation from leading MNCs and institutes.

    The ICEMC2 2007 consists of 7 key note lectures, 10 paper sessions, 2 poster sessions, 2 tutorials, a panel discussion, and a

    cultural program. The conference activities are spread over a period of 4 days. The conference is well planned and tracked.

    The programs and papers are reviewed by some of the leading experts in this domain.

    Key Note lectures:

    We are glad that some of the leading experts are coming together to present key note lectures at ICEMC2 2007.

    Sam Pitroda, Chairman, Knowledge Commission, India

    Nalin Sharda, Victoria University, Australia

    Ravinder Sabhiki, IBM USA

    Rakesh Radhakrishnan, Sun Microsystems, USA

    Narendranath Udupa, Philips Software, India

    Santhosh Patil, Symbian Software, India

    A Balaji, Midas Communications, India

    Paper Sessions:

    The following bar chart shows the analysis of papers selected at ICEMC2 2007. There were close to 200 papers submitted for

    review. Even after submission deadline has been closed, we kept receiving the papers. Based on the reviewers comments, we

    could accept 30% of the papers submitted for final presentation. The papers have been selected based on their relevance to the

    conference theme, quality of research results, sound technical content, writing style and language, innovativeness. We have

    also tried to ensure that papers cover diverse topics of interest to the participants.

  • 7/30/2019 Icemc2 Advance Program

    12/50

    International Conference on Embedded Systems, Mobile Communication and Computing, August 3-5, 2007, Bangalore India

    ICEMC2 Paper Analysis

    0

    5

    10

    15

    20

    25

    30

    Ad-ho

    cNetwo

    rks

    Artific

    ialInt

    elligenc

    e

    Mobile

    Applicati

    ons

    Cellul

    arSy

    stems

    andH

    andover

    Embe

    dded

    System

    s

    FuzzyLog

    ic

    GridC

    omputin

    g

    Intelli

    gentAg

    ents

    Loca

    tionBa

    sedS

    ervices

    Multim

    ediaand

    DSP

    Netwo

    rkPe

    rformance

    Phy,M

    odula

    tionan

    dOFDM

    Robo

    tics

    Sens

    orNetwo

    rks

    Softw

    areEn

    gineering

    WLAN

    &Bluet

    ooth

    Cryp

    tograp

    hyan

    dNetw

    orkSe

    curityMi

    scellene

    ous

    Topics

    Papers

    Submitted

    Accepted

    The papers will be presented by authors from leading institutes and organizations from around the world. The paper

    sessions cover research progress in various topics as follows:

    Ad-hoc networks: Simulation of routing protocols, routing strategies, data accessibility in Manets,

    performance comparison, security protocols, QoS routing. Cellular System, Handover and Application: Temperature monitoring, economic RFID system, collision

    warning system, context aware End-to-end connectivity management, soft handoff performance, adaptive

    data transmission,

    Embedded Systems: Data storage device design and development, development life cycle, data acquisitionsystem, Multisensor autonomous robot, remote temperature monitoring.

    Fuzzy Logic, Grid Computing, and Location based Services: Intelligent system for crop, power systemstability using fuzzy logic, fuzzy diagnosis of esophagitis, Resource discovery using mobile agents in grid,

    GPS location based mobile emergency services, Mobile Yellow pages,

    DSP/Multimedia:MCTF for scalable video coding, block based thinning algorithm, model based tracking,comparison of digital video, semantic characterization of visual media, classification of environmental

    sounds, Quality and performance of video network, signal processing for real time multichannel GPS

    software receiver, digital sound processor for auditory prostheses, motion estimation in video codec,

    generation of super resolution video, Cryptography and Network Security: User Authentication, vulnerability in TCP/IP, secure signature

    schemes, security risks in VOIP, virus in mobile phones, key management, Implementation of cryptography

    using network processors, novel authentication and key agreement protocol, digital signature using LSB

    hiding and RSA, Chaos based encryption scheme, Montgomerry multiplication algorithm.

    Phy, Modulation, OFDM and Sensor Networks: Performance of MIMO systems, Rayleigh Fading effects,Localization algorithms, Subspace algorithm for MIMO.

    WLAN, Bluetooth and Network Performance: Security of 802,11a and HiperLAN/2, Load balancing inMPLS, QoS in MAC for WLANS, Enhanced Scheduling mechanism for Bluetooth, enhanced congestion

    control mechanism using network processor, QoS protocols of RPR, analysis of delay-tolerant networks.

  • 7/30/2019 Icemc2 Advance Program

    13/50

    International Conference on Embedded Systems, Mobile Communication and Computing, August 3-5, 2007, Bangalore India

    Proceedings: The conference proceedings is brought out as a CD with soft copies of papers, presentation slides, tutorial notes,

    key note lecture presentations etc. Also, a special issue of journal with selected papers presented at the ICEMC2 2007 is being

    brought out. The proceedings CD and journal serve as very useful research content for students, professionals, academics and

    researchers in this domain.

    The ICEMC2 2007 is attracting participants from all over the world. Some of the leading institutes, organizations and MNCs

    from India, North America, Australia are participating. The conference was initiated soon after the first ICEMC2 2006. Soon

    the website was deployed by January 2007. The initial submission of papers was closed by 15 th April 2007. The conference

    attracted submission of approximately 200 research papers. The Conference Management Toolkit (CMT) was used for paper

    submission and reviews. After careful reviews, 65 high quality research papers were selected for the conference presentation.

    The conference program was reviewed at different stages. The ICEMC2 2007 is co-sponsored by PESIT, Wiley Publisher,

    Microsoft, Indian Space Research Organization, Philips, Global Edge, MCNC, Wiley and other organizations. We thank all

    the co-sponsors.

    The conference committee comprises of some of the leading experts in Embedded systems, Mobile Communication and

    Computing. The committee is drawn from both academia and industry and represents almost all the aspects of the domains.

    PESIT with its beautiful campus and good infrastructure is well suited to hosting the ICEMC2 2006. It is centrally located and

    has 3 star hotel on campus, ample parking facilities, computer network, canteens etc. to facilitate successful conference

    organization. The conference benefitted from review comments provided by volunteer reviewers.

    Acknowledgement: The conference organization received whole hearted encouragement and support from Prof K.N.Balasubramanya Murthy, Principal of PESIT. We would like to thank him for his efforts in shaping this conference and making

    it a big success. Prof Shylaja, of ISE dept need special mention as she took personal interests in supporting the conference

    activities. Then all the members of Mobile Communication and Networking Center of Excellence ( MCNC ) at ISE dept have

    significantly contributed in one way or the other. We thank Travel Corporation of India( TCI) for providing online registration

    for participants. We thank Mr Dakshina Murthy, PESIT for his advices and support through logo and brochure designs. We

    also thank M/S Lotus printers for ontime publication of CD and book proceedings and advance program booklets.

    Dr. Suthikshn Kumar, General Chair, ICEMC2 2007, 3th August 2007

  • 7/30/2019 Icemc2 Advance Program

    14/50

    Tutorials

    Thursday, 2nd

    August 2007

    2Pm-3:30 PM

    TutorialNo Title Speakers

    1

    Effective Learning of Mobile Communication usingReal World Analogies and Case Studies

    Dr. Suthikshn KumarPESIT, Bangalore

    Abstract:

    Whats fishing, cooking, gardening, eating, car repairing, butterflies, telescope, monkeys, frogs, etc got to do with

    teaching Engineering courses? In this tutorial, we build interesting analogies from real world to make the job of

    teaching very interesting. Analogies are a way of explaining something by comparing it to something else. This

    technique also uses partial similarity. For example, we may give an analogy of bird for explaining how airplane

    works. Case Studies are presented to students to improve their understanding of the subjects. In going through case

    studies, we learn from others experiences. We present some interesting analogies and case studies for specific subject

    of Mobile Communication. The tutorial is based on speakers experience in teaching Masters and Bachelors

    students. The tutorial is supplemented by resource CD on Mobile computing.

    Ref: CSI Communication, July 2007 issue, Effective teaching of Mobile Computing using Real World analogies and

    Case Studies.

    Bio:Dr. Suthikshn Kumar has 15+ years of experience in research and industry. He has worked in leading institutes andmultinationals such as Philips Semiconductor, Infineon Technologies, L&T Infotech, University of Melbourne, IIT

    Chennai, Telstra Research Labs, Bangalore University. Prof Kumar has won several awards for innovation and

    quality. Dr Kumar has worked in countries such as Australia, France, Germany, Netherlands, UK and India. His

    pioneering contributions to computing field include "Lateral Computing", "Smart Volume control", "Fractal Ring

    Tone Generator". Dr Kumar has presented 23+ research papers in leading international

    conferences/conventions/journals. He has worked on several cutting edge projects on Mobile communication, VLSI

    design automation, Parallel Computing etc. Dr Kumar has served as general chair and technical program chair of

    several international conferences and workshops such as WCLC 2005, WCLC 2004, WoSCo, ICEMC2 2006 etc. Prof

    Kumar is also founder and CEO of Uvinix Computing Solutions, a hi-tech statup.

  • 7/30/2019 Icemc2 Advance Program

    15/50

    2

    Programmable System On Chip (PSOC) for anEmbedded System Design

    Kashiraya Biradar*

    Dr. Vijaya P A*Mr. Anil K S**

    *Dept of E& CMCE, Hassan.

    **Cypress Semiconductors,

    Bangalore.

    [email protected]

    Abstract:

    This tutorial aims at the usage of Programmable System On Chip (PSOC) in an Embedded System Design.PSOCIntegrated Circuits (ICs) consists of many Mixed Signal Arrays with On Chip Controller devices. These devices are

    designed to replace multiple traditional Micro-Controller Unit (MCU) based system components by a low cost single-chip programmable component. A PSOC device includes configurable blocks of analog and digital logic as well as

    programmable interconnects. This architecture allows the user to create customized peripheral configurations to

    match the requirements of each individual application. Additionally, a fast Central Processing Unit (CPU), Flash

    program memory, SRAM data memory, and configurable Input/Output are included in a range of convenient pin out.

    We have carried out the experiments for the validation of Analog to Digital Converter (ADC), Digital to Analog

    Converter (DAC) and their characteristics. We have also interfaced Encore-II with another PSOC, where Encore-II

    itself is a PSOC. The register and memory contents of Encore-II were read / written with the help of a PCs hyper

    terminal. The results were found to be satisfactory.

  • 7/30/2019 Icemc2 Advance Program

    16/50

    Panel Discussions

    Saturday, 4th August 2007

    4Pm-5:30 PM

    Mobile Application Development: Trends, Prospects and Future

    Brief :Mobile devices are becoming more sophisticated and are growing to be part of everyday life. The exponential

    growth in wireless devices can be observed to impact our daily life. They are growing beyond the need of voice

    communication and finding new applications in messaging, web browsing, audio play back, video playback, image

    capturing, games etc. Application development for Wireless devices has become hot topic recently. The application

    developers benefit with newer mobile devices supporting such platforms as Java, BREW etc. J2ME, Nokia SDK,

    Windows Mobile, Flash Lite, WAP etc are providing the impetus to application developers in coming out with

    innovative applications and making the mobile devices rich with features. Mobile application developers face severalchallenges such as limited processing power, memory constraints, smaller display size and key pad, battery power

    limitations, lower bandwidth, higher delay and jitter etc. In this discussion, the focus is on platforms, environment

    and innovation in Wireless Application development for Mobile devices.

    Panel Discussion topics:

    Innovative applications for Wireless devices Development Platforms: J2ME, BREW, Flash Lite, WAP

    Optimization techniques, Code Obfuscation, Virtual Machines

    IDEs: Netbeans, Eclipse,

    Location based applications using technologies such as Google Map API, GPS

    New Feature phones such iPhone

    Some important questions for panel members and Audience:

    Which are the killer applications for Mobile devices?

    What strategies should the Mobile Application developer community adapt?

    Which platforms are good for mobile game development?

    What will happen to Mobile Applications when 3G is deployed?

    What is the impact of WiMAX on Mobile applications?

    Should there be courses to impart Mobile application development skills?

    What is happening to technologies such as WAP?

    How are the device manufacturers supporting the Mobile applications?

    Which are the good competitions suited for Mobile Application developers?

    What are the business Models?

    How to test the applications and get certified?

    What are the security issues, IP issues, virus issues etc tackled?

  • 7/30/2019 Icemc2 Advance Program

    17/50

    Session 1A: Ad-hoc Networks

    Friday 3rd

    August 2007

    2-3:30PM

    PaperNo Title Author

    15

    Simulation of DSDV, AODV and DSR Routing Protocols InAd-hoc Network

    Shyam Lal*, NIT,Kurukshetra-india,[email protected]

    This paper presents the simulation of DSDV, AODV and DSR routing protocol in ad-hoc network using NS-2 simulation. An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporarynetwork without the use of any existing network infrastructure or centralized administration A simulationmodel with MAC and physical layer models is used to study interlayer interactions and their performanceimplications. The On-demand protocols, AODV and DSR perform better than the table-driven DSDVprotocol. Although DSR and AODV share similar on-demand behavior, the differences in the protocolmechanics can lead to significant performance differentials. The performance differentials are analyzedusing varying network load, mobility, and network size.

    21

    Highly Dynamic Multivalued Unified Vector Routing ForAd-Hoc networks Naga Raju*, Kits,

    [email protected]

    Abstract Mobile Ad-Hoc networks are combination of wireless nodes which dynamically exchange data -among themselves with out any centralized access point. In this paper we describe an idea of constructingmulti path [1] routing from source to destination node in Mobile Ad-Hoc networks with the help of qualitativemetric We have made changes to Highly Dynamic Distance vector routing vector algorithm [2] to alsosatisfy the requirements of mobile ad-hoc networks. In DSDV every node periodically broadcast currentassociated statistics to its neighbor nodes. We transform the attributes values of the statistics in to unifiedranks [3], the average of unified rank is treated as a qualitative fitness value of the link. Routing decisionprocess has been enhanced by embedding this proposed qualitative fitness metric for selection of multiplepaths in DSDV for efficiency (increase the reliability of data transmission or to provide load balancing).Index terms: Multipath, unified rank, qualitative fitness.

    63Routing Strategies in MANETs

    Sujatha B R*, Malnad college ofEngineerng; Shiva Prakash,Bahubali College Engineering;Sathyanarayana M V, MalnadCollege of [email protected];[email protected];[email protected]

    Abstract: Adhoc networks are self-organisable mobile networks with data transfer occurring in adynamically varying environment. This poses lots of challenges in terms of low data rates, varying fadedsignals arriving at the receiver, varying topology, severe power constraints etc. Routing is the most

  • 7/30/2019 Icemc2 Advance Program

    18/50

    important aspect considering all the above constraints. In this paper an attempt has been made to look forrouting protocols, which provides sufficient QoS using limited overheads during transmission, consuminglimited power. Simulation results will indicate the variations in throughput, delay etc for different network

    scenarios. Index Terms: Mobile Adhoc Networks (MANETs), Proactive routing, Reactive Routing, HybridRouting, Core Extracted Distributed Adhoc Routing (CEDAR), Rushing Attack Prevention protocol (RAP),Energy Aware DSR (EADSR).

    64Improved Data Accessibility in MANETS

    Shiva Prakasha*, BahubaliCollege of Engineerin; HarishM, Malnad College ofEngineering; Sujatha B R,Malnad College of [email protected];[email protected];[email protected]

    Abstract: The growth in wireless communication technologies attracts a considerable amount of attention inmobile adhoc networks. All mobile hosts in an adhoc network are embedded with packet forwardingcapabilities. Typical applications of these networks are outdoor special events such as conferences,concerts and festivals; places with no network infrastructure; cases of emergencies and natural disasters;and military maneuvers. It is decentralized and independent of infrastructure. Since mobile hosts in anadhoc network usually move freely, the topology of the network changes dynamically and disconnectionoccurs frequently. These characteristics make it likely for a mobile adhoc network to be separated intoseveral disconnected partitions, and the data accessibility is hence reduced. Several schemes have beenproposed to alleviate the reduction of data accessibility by replicating data items. Although the previousalgorithms consider no restriction on the memory space in each mobile node for replication, it isimpracticable. In this paper an attempt is made in studying two replication algorithms in which the memoryspace is restricted. Later an improvement over these protocols using threshold value is considered. IndexTerms: Mobile Adhoc Networks (MANETs), Static Priority Method (SPM), Dynamic Priority Method (DPM)

    114

    Performance Comparison of TCP with Moving Gatewayfor Proactive and Reactive Protocol in Adhoc Network

    MANISH MADHUKAR*,SMIT,SIKKIM;BINDU AGARWALA,SMIT,SIKKIM; SANGAPPABIRADAR, SMIT,[email protected];[email protected];[email protected]

    A Mobile Ad-Hoc Network (MANET) is a decentralized network of autonomous and self organized wirelessnodes. The paper tries to state about the performance of TCP with moving gateway in an adhoc network.The TCP with mobile IP gives the mobility support to the adhoc nodes. The moving gateway works as acommon gateway for rest of the nodes that send traffic using the closest neighbors through all nodes that iswithin the range of intermediate node(s). The hop-to-hop transfer mechanism is continued throughout thenetwork until destination is not reached. If any node is not receiving data in any way, it means the node isnot connected with the gateway.

    115

    Security Protocols and Threats in Ad-hoc and SensorNetworks Pradeep R*, IIIT-B

    [email protected]

    Security is an essential service in both wired and wireless communications. The success of ad-hoc andsensor networks strongly depends on the peoples confidence in its security. However the characteristics of

  • 7/30/2019 Icemc2 Advance Program

    19/50

    ad-hoc networks pose challenges and opportunities in achieving security goals, such as confidentiality,authentication, data integrity, availability, access control and non-repudiation. Authentication in ad-hocnetworks is a core requirement for secure protocols and secure applications of ad-hoc networks. Thus

    security in ad-hoc networks is the main focus of this work. The paper gives an overview of the existingefficient security protocols suitable for both ad-hoc and sensor networks: Zero Common Knowledge(ZCK)protocol, Identity Certified(IC) Authentication protocol, SPINS. The last section of the paper discusses thechallenging threats to ad-hoc and sensor networks which gives an in- depth analysis as to how robust anauthentication protocol should be.

    145

    Signal Stability based QoS Routing (SSQR) for Mobile AdHoc Networks

    Giriraj Chauhan*, IIT Guwahati;Sukumar Nandi, IIT [email protected];[email protected]

    We propose an on demand quality of service (QoS) routing scheme named signal Stability based QoS

    Routing (SSQR), that provides QoS support in terms of bandwidth and end-to-end delay in mobile ad hocnetworks (MANETs). SSQR is designed over Signal Stability based Adaptive Routing (SSA) and aims tofind and maintain stable QoS routes in ad hoc network. The main objective of SSQR is to select QoS routesthat can survive for longer period of time. This is accomplished with the help of signal stability whichconsists of signal strength and link stability . The performance of SSQR is extensively investigated bysimulation in NS-2. Our results validate that SSQR represents an important improvement by selectinglonger-lived QoS routes in mobile wireless networks.

  • 7/30/2019 Icemc2 Advance Program

    20/50

    Session 1B: Cellular System, Handover and Applications

    Friday 3rd

    August 2007

    2-3:30PM

    PaperNo Title Authors

    4

    Temperature monitoring and device control using ARM

    Processor and GSM Technology

    Subhas Meti*, S G G S I E & T;Balasaheb Patre, S G G S IE&TNanded

    [email protected];[email protected]

    Advanced RISC Machine (ARM) microprocessors, that directly target products in this market at theconvergence of computing, communication and consumer. And GSM is one of the most important technology inwireless communication system, which contains three main services of short message, speech communicationand data communication. Aiming at the features of industrial process parameter acquisition of large quantityinformation about process variables working in field. The paper combined the GSM module and ARMprocessor, which is used to monitor the industrial process parameters data acquisition and monitoring thestatus, acknowledging and also to control the Field Devices, Using and GSM technology (SMS). The advantageof having ARM processor is that less power consumption. Power conservation is growing more important formany machines that we use every day. The main objective of the paper is to monitor process parameters,compare with the set point, if parameter value is about set point send an SMS to control room and stop the

    process else process will be continuously running. Key words: ARM processor, GSM technology.

    113Algorithm for the Selection of Reader Position to RealizeEfficient and Economic RFID System

    Aritra Choudhury*, JadavpurUniversity; Narendra Das,Jadavpur University; SubirSarkar, Jadavpur University;Indibar Mondal, [email protected];[email protected];[email protected];[email protected]

    The basic elements of a RFID network are readers and tags. Generally, the RFID network consists of severalreaders and a numerous number of tags. Now-a-days, practical RFID networks contain up to several hundredtags and for controlling their operation only few readers. For a decent work environment, it is extremelynecessary to position the reader at a suitable location relative to the tags so that it is possible to control theoperation of all the tags through the command (signal) issued by the reader satisfactorily. Our present workdescribes an algorithm and its implementation in software to find the position of the reader for controlling theoperations of hundreds of tags according to the necessity of the user.

    125

    Dedicated Short Range Communication for CollisionWarning System

    RAJESHWARI HEGDE*, BMSCOLLEGE OF [email protected]

  • 7/30/2019 Icemc2 Advance Program

    21/50

    In order to achieve a safe automotive society, it is necessary to develop an on-board intelligent system by theInter-Vehicle Communications (IVC). We all want to avoid the vehicular collisions under almost all situations

    such as intersections, highways, and blind corners by using IVC technology through wireless ad hoc networks.In this paper, we focus on the suitability of DSRC for a class of vehicular safety applications called CooperativeCollision Warning (CCW), where vehicles periodically broadcast short messages for the purposes of driversituational awareness and warning.

    34Context-Aware End-to-End Connectivity Management

    Jaydip Sen, P. Balamuralidhar, M.

    Girish Chandra, Harihara S.G., Harish

    Reddy

    Embedded Systems Research Group,

    Tata Consultancy Services, Bangalore-

    560066, India,

    emails: {jaydip.sen, balamurali.p,

    m.gchandra, harihara.g,

    h.reddy}@tcs.com

    In a dynamic heterogeneous environment, such as pervasive and ubiquitous computing, context-aware adaptation is a key

    concept to meet the varying requirements of different users. Connectivity is an important context source that can be

    utilized for optimal management of diverse networking resources. Application QoS (Quality of service) is another

    important issue that should be taken into consideration for design of a context-aware system. This paper presents

    connectivity from the view point of context awareness, identifies various relevant raw connectivity contexts, and discusses

    how high-level context information can be abstracted from the raw context information. Further, rich context information

    is utilized in various policy representation with respect to user profile and preference, application characteristics, device

    capability, and network QoS conditions. Finally, a context-aware end-to-end evaluation algorithm is presented for

    adaptive connectivity management in a multi-access wireless network. Unlike the currently existing algorithms, the

    proposed algorithm takes into account user QoS parameters, and therefore, it is more practical.

    39

    Performance of Voice / Data Integrated Services inCellular CDMA in Presence of Soft Handoff

    SUMIT KUNDU*, IIT KHARAGPUR;Dipta Das, N.I.T Durgapur; Amit

    Acharyya,[email protected];[email protected];[email protected]

    Effects of soft- handoff (HO) on voice/data integrated services have been presented in this paper. Outage ofvoice is considered while performance of packet data transmission using multi-code (MC) CDMA is evaluatedon basis of throughput and delay in integrated CDMA in presence of soft HO. Influence of physical layer issueslike soft HO parameters, shadowing correlation, power control error (pce) on voice/data performance has beeninvestigated. The impact of higher data rate and voice user on data performance is indicated.

    77

    Adaptive Data Transmission in Cellular CDMA withVariable Spreading Gain in Presence of Soft Handoff

    SUMIT KUNDU*, IIT KHARAGPUR;Dipta Das, N.I.T Durgapur

    [email protected];[email protected]

    An adaptive data transmission scheme based on variable spreading gain (VSG) is studied in cellular CDMAnetwork in presence of soft handoff (HO). The processing gain is varied depending on channel traffic intensitysatisfying a requirement on data bit error rate (BER). The overall performance improvement due to processinggain adaptation and soft HO is evaluated and compared with a fixed rate scheme. The influence of soft HOparameters on rate adaptation and throughput and delay performance of data is indicated.

  • 7/30/2019 Icemc2 Advance Program

    22/50

  • 7/30/2019 Icemc2 Advance Program

    23/50

    Session 2A: Embedded Systems

    Friday 3rd

    August 2007

    4-5:30PM

    PaperNo Title Authors

    13

    DESIGN AND DEVELOPMENT OF FILL-GUNA SPECIAL DATA STORAGE DEVICE

    Shivalingappa Hunagund*, BVBcet Hubli;Anil Nandi, BVBcet [email protected]; [email protected]

    ABSTRACT: This work is carried out at SLN Technologies, Bangalore for the defense application. Fill gunis a data storage device used in military applications to download the data from the PC. The downloadeddata is transferred to other fill gun units and also to the communication radios located in the battlefield. Theimplementation of this project involves Design, Development, Fabrication, Hardware and Software Testing,Verification and Validation. Here the data is downloaded from the PC by connecting the fill-gun to the serialport and running the fill gun software on the PC. The stored frequency range is 225 MHz to 399.75 MHz.The data stored in the fill gun is transferred to other fill gun units using RS232 cable at the baud rate of9600 bps. Communication is implemented via an industry standard serial interface. Fill-gun is designed anddeveloped using the AT89LS8252 micro controller, Max3221 transceivers and using Max856 DC to DCconverter

    38

    Development Life Cycle for Complex

    Embedded Systems Design

    SHRIDHAR AITHAL*,

    NMAM INSTITTUTE OF [email protected]

    Complexity in embedded systems has been increasing as a result of growth in IC implementationtechnologies on one hand, ever increasing requirements for system functional and non functional featureson the other. Driven by the cost increases involved in the higher density chip technology and design gapexisting in the embedded system design community, more attention is being paid to multiple processor orcomponent architecture as a solution of designing complex embedded systems. In this article, an attempt ismade to get a big picture of the complex embedded systems design and summarize the design life cycle forembedded systems. While advocating a need for a generalized framework for complex embedded systemdesign we also point out the need for more work in areas of accurate modeling, code generation, dynamichardware and software partition, gap modeling and wrapper generation. A generalized case study isplanned to emphasize the need for a frame work.

    89

    Temperature, Wind Speed and WindDirection Data Acquisition System

    ATISH GUPTA*, PEC; Neelam Prakash, [email protected];[email protected]

    Knowledge of temperature, wind speed and direction course during a certain time is needed in scientific,industrial and weather monitoring applications. The purpose of this paper is to discuss about thedevelopment of the temperature, wind speed and direction logging systems by using a microcontroller andcomputer interface. The specific solutions are considered for the creation of embedded system by modulusprinciple for data acquisition, processing and visualization, intended for giving of short-term weatherforecast. Product includes measurement, displaying, and recording on the basis real time constraints.

  • 7/30/2019 Icemc2 Advance Program

    24/50

    Recording include storing of data in a non volatile EEPROM at regular acquisition time intervals (1 minuteup to 1 hour). Both memory size and the recording interval decide the quantity of the data. Transfer of therecorded data is done through serial port communication. User gets a formatable output in terms of lists,

    tables, charts and diagrams on computer. Whole architecture of the microcontroller including advancedprogramming techniques at microcontroller and computer end.

    143

    An Embedded System-on-ProgrammableChip (SOPC) for a Multi-sensor AutonomousRobot.

    Prabhakar Mishra*, PES Institute ofTechnology; Shankar H, PES Institute ofTechnology; Ashutosh Pathak, New HorizonCollege of [email protected];[email protected];[email protected]

    Path planning and obstacle avoidance are the two major issues in any autonomous navigation system. Thisnecessitates the use of (i) multiple sensors on a robust and real time processing platform which is

    computationally efficient; and (ii) a set of heterogeneous actuators. Also, conflicting specifications must beconcurrently met. We present here a design methodology for an embedded system-on-chip and itsimplementation targeted for an autonomous navigating robot. The concern is to meet constraints such aspayload, placement, response time, throughput, power consumption and control. We leverage thearchitectural advantages offered by programmable ASICs and use them to ensure modular, distributed andfault-tolerant implementation. With a strategic mix of software-hardware load sharing, we demonstratesubstantially enhanced overall performance.

    166

    Remote Temperature Monitoring using anEmbedded Computer MAYANK AGGARWAL*, VIT, VELLORE

    [email protected]

    The concept of applications that can operate independently and automatically with minimal humaninteraction find appeal in various areas ranging from home to the far frontiers of the space. One such areais remote temperature monitoring. The solution uses the TINI a Java enabled embedded computerconnected to a network of 1-wire devices. The TINI is used to collect and transfer data to a remote serverfor storage and processing, using either a wired or a wireless interface. The 1-wire devices connected toTINI can be accessed any time over the network by using application like web browser where the TINI actsas a platform providing the communication. The system also provides an instant visual feedback via a localLCD display connected to a serial port of TINI for real-time monitoring. The modular approach followed inthe development of the system allows additional 1-wire devices to be integrated to the present system.

  • 7/30/2019 Icemc2 Advance Program

    25/50

    Session 2B: Fuzzy Logic, Grid Computing and Location Based Services

    Friday 3rd

    August 2007

    4-5:30PM

    PaperNo Title Authors

    59Intelligent System for Most Suitable Crop HEMANT BARADKAR*, JDIET Yavatmal

    [email protected]

    There are many definitions of intelligence. A person that learns fast or one that has a vast amount of experiencecould be called "intelligent". However for our purposes the most useful definition is the systems comparativelevel of performance in reaching its objectives. Agriculture comprises much of the Indian land area and is criticalto environmental economic and social sustainability. Intelligence Cropping System to improve yield from Crops isa system to predict the name of crop that will give maximum yield and this crop will be more suitable for aparticular type of soil & atmospheric condition. Maximum yield from crops depends on the various soilparameters. In this system total 15 important soil parameters and 22 crops are considered. This system uses thehardware part which is interfaced with PC to form a Intelligent system for prediction of crop. The software used isMATLAB with Fuzzy logic toolbox. The hardware part comprises of transducer/sensors, ADC 0809 is used toconvert the analog quantity to its equivalent digital quantity which is given to the system model. Input to thesystem are soil parameters which are sensed using transducers and are converted in to equivalent digital valuesusing ADC. The hardware part is interfaced to PC using RS232 bus. The output of a system is one most suitablecrop depending on the current parameter of soil.

    70

    POWER SYSTEM STABILITY USINGFUZZY LOGIC CONTROLLER

    Indpreet Kaur*, Student- pEC, chandigarh; BalwinderSingh, [email protected];[email protected]

    This paper proposes a fuzzy based coordinated control scheme using Heffron-Philips model, which decides theoperating regions of local control laws, such as, small signal controller. The proposed controller accepted twofuzzy inputs, speed deviation and change in angle. These signals were computed using fuzzy membershipfunction. The objective of this paper is to study and design the fuzzy logic based power system stabilizer usedfor the small signal stability analysis. This is based on the implementation of fuzzy logic technique to powersystem stabilizer to improve system damping. The effectiveness of the fuzzy logic PSS in a single infinite bus willbe carried out by simulink block design and MATLAB 7.0. The performance was compared with power system

    stabilizer (PSS) and without PSS.

    180

    Fuzzy Decision Support System forDiagnosis of Esophagitis Santosh Saraf*, Gogte Institute of Technology

    [email protected]

    In this paper, we present a Fuzzy Decision Support System for diagnosis of Esophagitis. It is a condition ofinflammation of the Esophagus. The condition is detected by inserting an endoscope in the Upper Gastro-Intestinal tract. The Upper GI tract covers the esophagus, duodenum and the stomach area. The endoscopistobserves the area and captures images of the parts which aid for diagnosis of a condition. The images areanalyzed by the endoscopist and based on the experience and the knowledge of the endoscopist, the condition

  • 7/30/2019 Icemc2 Advance Program

    26/50

    is diagnosed. We have designed a Fuzzy Decision Support System which aids this process. Erosive and Non-Erosive Esophagitis are considered.

    137

    Centralized Resource Discovery usingMobile Agents in Grid and its EfficientRetrieval

    Deepak Khandelwal*, IIT Roorkee; Padam Kumar, [email protected]; [email protected]

    A computational grid system is basically an infrastructure that facilitates sharing of networked resources andlocation-independent access to these resources. Resource Discovery forms a very important part of such asystem. Majority of the existing techniques in use for resource discovery are reactive in nature, i.e. they cause arequest for a resource to initiate the discovery of resources at various sites of in the grid. In this paper, we haveproposed a framework which offers a proactive approach to resource discovery. We have discussed the designof a module Service Repository that may be maintained at a single or multiple sites that stores the freshestpossible information about the availability of resources throughout the grid. This data is kept as fresh as possible

    with the use of Mobile Agents that are created and dispatched for various sites for the purpose of gatheringresource related information from those sites. The several different techniques in which this can be done arediscussed along with the pros and cons of each. Efficient retrieval of the accumulated information also plays avery important role. We have proposed a novel usage of trees to efficiently process the query of a site thatcontacts the Service Repository to check for availability of resources in the grid. We have implemented themobile agents using Java Aglets.

    3

    GPS LOCATION BASED MOBILEEMERGENCY SERVICES

    Deergha Rao Korrai*, Osmania University; KoteshSharma V, Osmania [email protected]; [email protected]

    The knowledge of mobile users location by the service provider can enhance the class of services andapplications that can be offered to the mobile user. These class of applications and services, aretermed aslocation based services.The future 4G systems promise to handle an integration of different services(e.g.operate GSM and GPS at the same time. In this paper, a simulator version of Location based mobile emergencyservice system is designed by using personal computers and microcontroller. The design is implemented usingAVR AT90S8515 Microcontroller, and Personal Computers. One computer with LINUX operating system is usedfor GPS receiver simulator at the side of emergency service required mobile user. The other computer displayspositioning of the mobile user on the corresponding digital map at the emergency service provider side to trackthe corresponding service required mobile user

    55

    Location, Device and User ProfileSensitive Mobile Yellow Pages

    Saptarshi Debroy*, Jadavpur University; SabyasachiDe, Jadavpur University; Saikat Das, JadavpurUniversity; Angshuman Chakraborty, Jadavpur

    [email protected];[email protected];[email protected]; [email protected]

    Advertising on mobile devices has large potential due to the very personal and intimate nature of the devicesand high targeting possibilities. Keeping in mind that next phase of electronic growth will be in the area of mobilee-commerce the translation from commerce has already started. Context sensitive mobile advertising is astepping stone in path of this translation. In this paper we have presented a framework of a context sensitivemobile advertising system which works independent of the service provider to provide the mobile user pull basedadvertisement depending upon the current location, device type and mobile user profile. The paper discussesrelated works of other context sensitive advertising systems and the difference of our system with them. Thispaper also shades light on the possible ways to make the system interactive to such extent so that a user can

  • 7/30/2019 Icemc2 Advance Program

    27/50

    order for products and services through the mobile device itself.

  • 7/30/2019 Icemc2 Advance Program

    28/50

    Session 3A: Multimedia and DSP

    Saturday, 4th

    August 2007

    11AM- 1PM

    PaperNo Title Authors

    12

    Computationally EfficientMCTF for Scalable VideoCoding Karunakar K*, MIT; Kumkum Garg, Mit Manipal

    [email protected]; [email protected]

    In 3D-wavelet video coding framework, the temporal filtering is done along the trajectory of motion usingMotion Compensated Temporal Filtering (MCTF). Hence computationally efficient motion estimationtechnique is the need of MCTF. In this paper a predictive technique is proposed in order to reduce thecomputational complexity of MCTF framework, by exploiting high correlation among the frames in a GroupOf Picture (GOP). The proposed technique applies coarse and fine search of any fast block based motionestimation to the first pair of frames in a GOP. The generated motion vectors are supplied to nextconsecutive frames and only fine search is carried out around those motion vectors. Hence coarse searchis skipped for all the motion estimation in a GOP except for the first pair of frames. The technique is testedfor different fast block based motion estimation algorithms over the different standard test sequences. Thesimulation result reveals substantial reduction (i.e. 41% to 66%) in the number of search points of motionestimation without compromising the quality of the reconstructed video compared to non-predictive

    techniques. Since the motion vectors of all the pair of frames in a GOP except the first pair will have value1 around the motion vectors of the first pair of frames, the number of bits required for motion vectors arealso reduced by 50%.

    16A block based thinningalgorithm

    Nitin Gupta*, NIT Hamirpur;Sarvendra Kumar, NIT [email protected]; [email protected]

    Thinning algorithms are widely used as a useful method of pre-processing in image process. In this paper,a high-speed thinning algorithm (useful for character recognition) is proposed. The whole of the input imageis broken in small units and thinned image is obtained by applying the proposed algorithm. Somefundamental requirements of thinning and the shape of pattern are preserved very well. Algorithm is veryrobust to noise and eliminate spurious branch. The results of applying the algorithm on variety of images

    has been shown.

    19MODEL BASED TRACKING SUMANTH REDDY K*, NITK SURATHKAL

    [email protected]

    This paper presents an iterative method for tracking and classifying human activities in a video sequence.The basic idea is that activities can be positively identified from a sparsely sampled sequence of a few bodyposes acquired from videos. Connected Graph representation has been used to store the 2D humanposes. Then these samples are matched against the graph abstractions derived form the frame wheremotion is identified in the video sequence. Sum of Absolute Differences method is used for motiondetection in video frames. The probability of false activity detection drops exponentially with the increased

  • 7/30/2019 Icemc2 Advance Program

    29/50

    number of sampled body poses. The proposed method gives very good results for activity detection in thesurveillance video.

    49

    Segmentation & Comparisonof Digital Video Ranjan Parekh*, Jadavpur University

    [email protected]

    Over the last decade there has been a huge proliferation on the use of multimedia content throughout theworld. As such an efficient and fast mechanism for retrieval of media content from multimedia repositoriesassumes fundamental importance. This paper addresses the problem of segmentation of digital video andtheir characterization for similarity comparison and retrieval in a video database. Segmentation of video todetect cuts and identify shots is done using differential values of adjacent frame contents. Thereafter theshots are characterized using features derived from Grey Level Co-occurrence Matrix (GLCM) computedfrom representative frames. A set of four directional normalized symmetrical GLCMs, one in each direction0, 45, 90 and 135, are use for computation of the features. Comparison of video content for similarity

    retrieval is based on a combined set of GLCM features in an appropriate feature space.

    58

    Semantic Characterization ofVisual Media Ranjan Parekh*, Jadavpur University

    [email protected]

    Content based image retrieval techniques generally utilize low-level features to search, compare andretrieve images from databases. However the major limitation is that they fail to provide sufficientinformation about the semantic content of the media. Semantic characterization is necessary becausehumans tend to search or query for media based on their semantic features i.e. their meanings andassociations with real-world objects. However semantic concepts being based on human abstractions,

    unique definitions for their characterization do not always exist. Moreover automated systems cannotdirectly understand the semantics inherent in media content. This paper proposes a methodology involvingvisual keywords whereby semantics can be inferred from visual media through comparison of low-levelfeatures.

    69

    Classification ofEnvironmental Sounds Ranjan Parekh*, Jadavpur University

    [email protected]

    In a content based storage and retrieval (CBSR) scenario, this paper addresses the problem ofclassification of environmental sounds. Even though a substantial amount of research work has been done

    in the area of speech and music recognition, relatively less work has been done for environmental soundclassification. One reason for this is possibly the extreme difficulty in accurate classification due to the largevariations inherent in such sounds. This work uses statistical measures derived from zero crossing rate(ZCR) and root mean square (RMS) values of audio samples and plots them in a combined feature spaceto discriminate between three classes of environmental sounds.

  • 7/30/2019 Icemc2 Advance Program

    30/50

    Session 3B: Cryptography and Network Security

    Saturday 4th

    August 2007

    11AM- 1PM

    PaperNo Title Authors

    5

    COMPARATIVE ANALYSIS ON ALTERNATIVE

    SCHEMES FOR USER AUTHENTICATION

    Naveen Kumar*, Jamia MilliaIslamia, New Delhi;Prof. M.N. Doja, Jamia Millia

    Islamia, New Delhi

    [email protected];[email protected]

    Abstract-User Authentication is the procedure of determining whether a user should be allowed access to aparticular system or resource. Today, the alphanumeric passwords are used broadly for authentication, butother methods are also available, including biometrics, graphical passwords and smart cards, however,there are merits and demerits of these alternative technologies. Alphanumeric password basedauthentication system are simpler to administer and manage by user, As a result, these passwords areexpected to continue to remain so for some time [1]. With all these advantages alphanumeric passwordscontains well-known deficiencies with compromises on the security known as password problem[2].Graphical password ensures the high memorability of the user authentication, however the usability issuesare still focused area for research. Apart from these schemes biometric authentication promise the highestlevel of security but generally not affordable. We have studied and analyzed schemes those are mainly

    based on what you know like alphanumeric password, graphical authentication and schemes based onwhat you know & what you are like dynamic signature verification, voice authentication, audio-visualauthentication and, password based on thoughts. This paper will be useful for information securityresearchers and practitioners who are interested in finding an alternative to user authentication schemes.

    51

    Network Security: Vulnerability in TCP/IP- A SecureSolution

    Parikshit Mahalle*, SKNCOE,Pune;Geeta Navale, SKNCOE, Pune;Kishor Honwadkar, DYPCOE,Pune;Vinod Kimbahune, SKNCOE,Pune;Shaffi Pathan, SKNCOE, Pune

    [email protected];[email protected];[email protected];[email protected];[email protected]

    Network security is a complicated subject, historically only tackled by well-trained and experienced experts.However, as more people become wired, an increasing number of people need to understand the basics ofsecurity in a networked world. In this document we discuss some of the network security issues in TCP/IP.The Transmission Control Protocol/Internet Protocol (TCP/IP) [1] suite is a very widely used technique thatis employed to interconnect computing facilities in modern network environments TCP/IP is the language ofthe Internet. Anything that can learn to speak TCP/IP can play on the Internet. However, there exist several

  • 7/30/2019 Icemc2 Advance Program

    31/50

    security vulnerabilities in the TCP specification and additional weakness in a number of widely availableimplementations of TCP. These vulnerabilities may enable an intruder to attack TCP-based systems,enabling him/her to hijack a TCP connection or cause denial of service to legitimate users. We discuss

    some of the flaws present in the TCP implementation of many widely used operating system and providerecommendations to improve the security state of a TCP-based system, e.g., incorporation of a timerescape route from every TCP state.

    62Performance of Forward Secure Signature Schemes Krishna Prasad*, IIIT Bangalore

    [email protected]

    With the rapid growth of untrusted mobile environments, forward secure signature schemes havesignificantly received more attention than the ordinary digital signature which faces difficulties with keyexposure. The technique of forward security helps to mitigate the damage caused by the exposure ofsecret keys. The principle behind the Forward Security is that the secret keys are updated at regularintervals of time and it does not allow the adversary to break the scheme for any prior time period. This

    survey paper provides a detailed description about the different types of forward security schemes andthen deals with the comparison of various generic forward secure schemes based on their individualrelative performances.

    66

    Study and Analysis of Security Risks in VoIPApplication:Various Approaches and Solutions

    Nagaraj Cholli*, IIT Roorkee; KiritModi, [email protected];[email protected]

    As VoIP technology becomes more widely deployed due to its economical advantage over traditional PSTNservices, however, there are several security risks. In this paper, several such security risks are discussed.This paper explains the security risk factors associated with IP telephony-based networks .It also outlines

    steps for helping to secure an organizations VoIP network. and provides an overview of possible solutionconcern to those security risks. In this context we provide a brief overview of a general architecture of VoIPinfrastructures and possible attack scenarios on VoIP servers utilizing the SIP signaling protocols, attackson DNS and ENUM which are used for address resolution and STUN which is used for NAT traversal.Further, we present various approaches for securing service components in the Internet and discuss theirsuitability for VoIP services.

    74Virus in Mobile Phones Vaishnavi Subramanian*, IIIT-B

    [email protected]

    Mobile phones and handheld computers have become a target for attacks and a vehicle for malicious code.With the exponential growth of these device population combined with the convergence of networks, it will

    be much devastating compared to PC based viruses, worms and Trojan horses. The trickle of maliciousprograms that embarked upon Symbian in 2004 has become a constant stream threatening to become atorrent spawning a multitude of families. The attacks could range from installing malicious software thatdeletes personal data, running up a victim's phone bill by making toll calls or sending a SMS/MMS todegrading or overloading mobile networks with denial of service (DOS). It took couple of decades forcomputer virus to evolve but only a couple of years for the mobile virus to cover the same ground. Thispaper introduces some of the pernicious Mobile Viruses, Worms, Trojans and their mode of propagation asa study. This paper also proposes how these malicious software can be prevented in a proactive way.

    79

    Key Management for Cumulative Member Removal inSecure Group Communication

    Poornima A.S.*, SiddagangaInstitute of techno; R. Aparna,Siddaganga Institute of technology

  • 7/30/2019 Icemc2 Advance Program

    32/50

    [email protected];[email protected]

    Many applications like pay-per-view, distribution of digital media etc., require secure group communicationservices in order to deliver packets from one or more authorized senders to a large number of authorizedreceivers. The main issue in secure group communication is group dynamics and key management. Ascalable secure group communication model ensures that whenever there is a membership change, newgroup key is computed and distributed to the group members with minimal computation and communicationcost. Handling member removal(leave) is more complex than member join event in any secure groupcommunication model. In this paper m-ary tree structure is used, with number of keys at each level beingm. Here, we address cumulative member removal(leave) and present protocols that minimize the numberof messages required to distribute new group key to remaining members in the group. The issues relatedto two members removal(leave) and cumulative arbitrary members removal are handled separately.

  • 7/30/2019 Icemc2 Advance Program

    33/50

    Session 4A: Multimedia and DSP

    Saturday 4th

    August 2007

    2PM-3:30 PM

    PaperNo Title Authors

    76

    Quality and Performance of VideoNetwork with the actual VideoSystems Products

    Emilio Jose Arruda Filho*, University of Bergamo ;Itamar Brito, Institute of Studies in Amazon;Katia Araujo, Institute of Studies in Amazon;

    Cyntia Nazare Ribeiro, Institute of Studies [email protected]; [email protected];[email protected]; [email protected]

    This article analyze the communication form from the video services group, which is developed betweentwo or more users, containing images, data and voice transmission, to facilitate the mobility problems in bigcompanies. These video conference systems which are applicable on many organizations are validatedbased on the Brazilian Federal Police situation, observing the product, the market and the servicedeveloped for them. For example, we will be presenting the system used at one department of that institutedenominated TELECENTRO, where the implanted structures, such as the service and quality transmission,are evaluated based on the performance and broadband. This system operates in all national federationunits and remote cities.

    102

    Signal Processing for Real Time Multi-channel GPS Software Receiver

    .Rajeev Yadav*, Center for Air Borne Systems;Nomi Sonowal, Center for Air Borne [email protected];[email protected]

    This paper describes a new approach for real time implementation of 12 channels tracking of GPS L1 C/APRN signals for software based GPS receiver on TigerSHARC platform. The main objective of this paper isto bring out overall signal processing flow from ADC to Tracking for a good number of satellites. Thesemethods were first developed in the Matlab and then real time implementation was done on TigerSHARCDSP platform running at 500MHz. The whole platform consists of RF portion, FPGA and TigerSHARC

    DSP. The sampled one-bit data comes from GPS RF front-end module, which consists of single stagedown conversion followed by ADC section. The GPS signal is CDMA using direct sequence to bi-phasemodulate the carrier frequency. FFT based correlation is used for signal acquisition to determine the carrierfrequency and code phase for each of satellites. Acquisition is followed by Carrier Pull-in module, whichgives close carrier frequency in the tracking range. Acquisition to tracking transition includes the estimationof PRN Code shift over a period of time and the modeling of ADC sampling clock error. Time taken byAcquisition and Carrier Pull-in module is important for a real time scenario. For achieving real time tracking,the ADC sampling clock characteristics are found out and modeled. Tracking module consists of codetracking loop and carrier tracking loop. An efficient way of implementing a MAC operation suitable for early,late and prompt correlation on a digital signal processor is presented. This approach makes efficient use oflogical XOR instruction of the DSP. All the algorithms of GPS signal processing were integrated withNavigation processing module (satellite and user position computation) and are tested and validated usingSpirent communications 12 channel GPS simulator

  • 7/30/2019 Icemc2 Advance Program

    34/50

    135

    Digital Sound Processor for AuditoryProstheses

    Rajakumar Kontham*, Andhra university;Seetha ramaiah P, andhra university;

    Damodar rao Y, andhra [email protected]; [email protected];[email protected]

    Auditory Prostheses is an electronic device that partially replaces the functions of the human ear. Unlike ahearing aid, it does not make sound amplification or filters the noise signal but instead bypasses normalhearing operation to directly stimulate the auditory nerve with electric current allowing hearing impairedpersons to receive sound. Auditory Prostheses is an artificial replacement of damaged inner ear usingexternal body worn speech processor and internal receiver-stimulator for stimulating auditory nerve viaelectrode array that enables understanding the speech by brain. Speech processor receives an externalsound or speech and generates encoded speech data bits for transmission to receiver-stimulator.Development of the Digital Sound Processor for Auditory Prostheses (DSPMAP) is based on the ANALOGDEVICES Digital Signal Processor ADSP-2185 is described. The DALLS DS89c420 microcontroller is used

    as data encoder to send speech information from speech processor to receiver-stimulator via RFtranscutaneous link. The system comprises a Digital Sound Processor, Microcontroller based DataEncoder, a Radio Frequency Transmitter using Amplitude Shift Keying (ASK), ASK receiver, Receiver-Stimulator, and an Electrode Array of six electrodes. Continuous Interleaved Sampling (CIS) speechprocessing algorithm is implemented for the sound processor. A multi-channel cochlear implant with sixelectrodes or simulated resistance array can be driven by the receiver-stimulator for testing itsperformance. The implementation aspects of CIS algorithm are validated using the test data of speechsamples. The results are presented using laboratory model of receiver-stimulator and simulated electroderesistance array with a high-speed data acquisition system.

    136

    Low Power VLSI Architecture for

    Efficient Motion Estimation in VideoCodec Chip

    RANJAN MAITY*, IIT, Kharagpur;MONALISA SARMA, IIT, Kharagpur;DEBASIS SAMANTA, IIT, [email protected];[email protected];[email protected]

    With the present advancement of communication and information technology, the requirement of a lowpower video codec chip is highly on demand particularly in battery operated hand-held mobile applications.In this work, we have proposed a VLSI architecture for motion estimation task in video coding. For motionestimation we have considered the TBHEX block matching algorithm [1]. Synthesis of the proposedarchitecture with Synopsis Design Analyzer tool reveals as few as 30K gate count including memory withinthe chip boundary and 22.14mW power requirement. This is indeed a significant improvement compared tothe existing low power architectures reported till date.

    154

    Generation of Super-Resolution Videofrom Low Resolution Video Sequenceswith Improved Lightening and TemporalResolution

    T MADHU SUDHAN*, NITK SURATHKAL;Alwyn Pais, NITK [email protected];[email protected]

    An algorithm for enhancing the resolution of video through histogram based segmentation and frequencydomain registration is proposed. Segmentation of the video is done using Histogram method and frequencydomain approach is used for registration of images. Bi-cubic interpolation is applied to this video togenerate the super-resolution (SR) video. The algorithm has been tested on indoor/outdoor videosequences and very good visual results are obtained. Based on the requirements additional brightness andtemporal resolution can be added to the SR video.

  • 7/30/2019 Icemc2 Advance Program

    35/50

  • 7/30/2019 Icemc2 Advance Program

    36/50

    Session 4B: Cryptography and Network Security

    Saturday 4th

    August 2007

    2PM-3:30 PM

    PaperNo Title Authors

    96

    Implementation Of CryptographyIn Routers Using NetworkProcessor IXP 2400

    Anusuya KV*, PSG College of Technology;Subha Rani S, PSG College of [email protected];

    [email protected]

    The Network Processors (NP) are designed for a wide range of access and edge applications includingmulti service switches, routers and deep packet inspection. The NPs are fully programmable Processorswhich utilize the technological advancements such as Hyper Task Changing which enables them toperform number of simultaneous operations. This ensures full network performance and alsoaccommodates complex services such as security on a packet basis. In this paper, the NP has beenconfigured as a Router and the performance statistics of the NP under RSA algorithm has been assessed.Since Network Processor can be configured on different design mapping, Cryptography has been includedas part of Protocol Suite to provide security at line speed. It is well known that RSA is an implementation ofthe more general concept of Public key cryptography method for encrypting messages. Hence,Cryptography on packet basis has better performance and flexibility on a Network Processor.

    117

    Implementation andPerformance Analysis of NovelAuthentication and KeyAgreement Protocol for UMTS PRABHU K*, PSG College of Technology

    [email protected]

    In this paper implementation and performance analysis of 3G UMTS authentication and key agreementprotocol (AKA) are done. In section I, security of 3G UMTS is compared with GSM in terms various securityfeatures. In section II, existing and new protocols for different operating environment (when user is in homen