Paper Registration Fee Details

Program Schedule

   

List NetCoM - 2009


Accepted Papers

008 Secure Key Exchange and Encryption Mechanism for Ad Hoc Networks
B. Upendra & S. Sumathy ,VIT University,Inida

010 Perceptual Features based Isolated Digit and Continuous Speech Recognition using Iterative Clustering Approach
A.Revathi, Dr. Y. Venkataramani ,Saranathan College of Engg., Trichy,Inida

011 Performance of Dominating Sets in AODV Routing protocol for MANETs
A Nagaraju*,B. Eswar ,JNTU,India

012 PhishNet: Enhancing the Security Aspect of IMS Users
Reshmi Maulik, Nabendu Chaki ,University of Calcutta,India

016 vertical handoff in heterogeneous wireless mobile networks
C.B.Hebbi and S.V.Saboji ,National Institute of Technology, Durgapur, India

017 Dynamic buffer allocation – A new approach to reduce buffer size at receiver in VCAT enabled Next Generation SDH Networks
, Barkatullah university institute of technology,BU,Bhopal

021 Intelligent Clustering in Wireless sensor Networks
Ehsan Heidari, Ali Movaghar , Islamic Azad University (Doroud Branch Sharif University of Technology Iran

026 A Pascal Graph Property and Computer Network Topology
Sanjay Kumar Pal,Subhrendu Guha Neogi & Samar Sen Sarma ,University of Calcutta

029 IPSTORAGE: CASE STUDY
Somayaji Siva Rama Krishnan, Ch.A.S.Murty ,VIT University, CDAC India

030 Just Queueing: Scheduling Mechnism for the Internet
Yaser Miaji and Suhaidi Hassan ,Universtiy Utara Malaysia,Malaysia

033 Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet
Omar Almomani, Osman Ghazali, Suhaidi Hassan ,Universiti Utara Malaysia Malaysia

036 High performance Image Steganalysis through stego sensitive feature selection using MBEGA
S.Geetha, Siva S.Sivatha Sindhu and Dr.N.Kamaraj ,TCE,India

046 Impact of sink mobility on network performance in wireless sensor networks
K.THANIGAIVELU & K.Murugan ,Anna University Chennai, India,

047 A Practical Approach for Planning WLAN Deployment under 3G Cellular Network
Samir K Sadhukhan,Swarup Mandal2 & Debashis Saha ,Indian Institute of Management Calcutta, India, 2Wipro Technologies Kolkata, India

048 A novel algorithm for graded precision localization in wireless sensor networks
S. Sarangi, S. Kar , Indian Institute of Technology, Delhi, India

049 Fault Analysis of Security Policy Implementations in Enterprise Networks
P Bera, Pallab Dasguptay and S K Ghosh , Indian Institute of Technology, Kharagpur, India

050 MSTBBN: M-way Search Tree Based Base station to Node Communication Protocol for Wireless Sensor Networks
Pankaj Gupta,Tarun Bansal,Manoj Misra , Indian Institute of Technology, Roorkee, India

053 ENERGY EFFICIENT WIRELESS SENSOR MAC PROTOCOL FOR COLLISION AVOIDANCE
Abhishek Samanta, Dripto Bakshi , Jadhavpur University, India

055 On-body Packet Routing Algorithms for Body Sensor Networks
Muhannad Quwaider, Subir Biswas , Michigan State University USA

056 End-to-End Network Delay-Constrained for QoS Multicast Routing
Balakannan S.P, Yier Yan, Jae Seung Yang and Moon Ho Lee , Institute of Information and Communication Chonbuk National University, Jeonju, Korea

058 Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication
A.John Prakash and V.Rhymend Uthariaraj , Anna University Chennai, India

059 Planning and Analysis Tool for Large Scale Deployment of Wireless Sensor
Apala Ray , ABB,India

061 A SCHEDULING POLICY FOR BATTERY MANAGEMENT IN MOBILE DEVICES
B.Malarkodi, B.Prasana and B.Venkataramani , National Institute of Technology, Tiruchirappalli

066 AN ATTACK VECTOR FOR DECEPTION THROUGH PERSUASION USED BY HACKERS AND CRAKERS 
Mosin Hasan and Nilesh Prajapati, , BVM Engineering College, V V nagar, Gujarat,India

067 Accuracy of 3D location computation in GSM through NS2
Anand Gupta, Harsh Bedi, Don Bosco and Vinay Shashidhar , Netaji Subhas Institute Of Technology,India, Delhi University,India

068 Cricket/Mica2 Based Discrete Event Simulator for WiHoc Ver.1.0 Localization Analysis
Shamala.S, Sangeetha. T and Moqry, , University Putra Malaysia Malaysia

070 Anonymous but Traceable IP Address-based Communication System
Keiichi Sakakima, Shingo Ata and Hiroshi Kitamura, , Osaka City University NEC Corporation / University of Electro-Communications, Japan

070 Anonymous but Traceable IP Address-based Communication System
Keiichi Sakakima, Shingo Ata and Hiroshi Kitamura, , Osaka City University NEC Corporation / University of Electro-Communications, Japan

071 Enhancing QoS and QoE in IMS enabled Next Generation Networks
Kamaljit I. Lakhtaria ,Saurashtra University,India

077 A SCHEME FOR THE DESIGN AND IMPLEMENTATION OF A DISTRIBUTED INTRUSION DETECTION SYSTEM
K.B.Chandradeep, ,JNTU India

079 PERFORMANCE IMPROVEMENT OF WIRELESS SENSOR NETWORKS USING LAYERED SPACE TIME CODES
Dr. M.A.Bhagyaveni, K.Rajeswari ,Anna University CEG

080 Neural Network Based Energy Efficient Clustering and Routing in Wireless Sensor Networks
Neeraj Kumar, 2R.B. Patel, Manoj Kumar ,SMVD University, Katra (Jammu & Kashmir), India, 2 MM University, Mullana (Ambala), India

081 Opportunistic Auto-Adaptive Dissemination in Vehicular Ad-hoc Networks
Niu Jianwei, Liu Chang, Ma Jian ,School of Computer Science and Engineering, Beijing University of Aeronautics and Astronautics Beihang University Nokia Research Center China

082 Throughput enhancement of starved TCP Flow Through concurrent transmission
Rajesh Verma, Arun Prakash, Rajeev Tripathi,Neeraj Tyagi ,MNNIT, Allahabad

084 Self-Stabilizing Multi Point Relays for Connected Dominating Set in Adhoc Networks
Rajiv Misra ,IIT Patna

086 The FN Quadratic Marking/Dropping Probability Function
Mohammed M. Kadhum & Suhaidi Hassan , Universiti Utara Malaysia

089 Multiple Mobile Routers based Seamless Handover Scheme for Next Generation Heterogeneous Networks
Arun Prakash,Rajesh Verma, Rajeev Tripathi, and Kshirsagar Naik1 , MNNIT, Allahabad, India , 1 University of Waterloo, Canada

090 Adaptive routing algorithm for MANET:Termite
Sharvani Gunakimath,Cauvery N.K,Rangaswamy T , R.V.C.E,India

094 Tree-Like Peer-to-Peer Symmetric Key Management in Mobile Ad hoc Network
Girish Kumar Patnaik,M. M. Gore ,MNNIT, Allahabad UP India

103 AMOBIROUTE: An Advanced Mobility Based Ad Hoc Routing Protocol for Mobile Ad Hoc Networks
Suparna DasGupta & Rituparna Chaki , JIS College of Engineering, Kalyani

104 Localization Scheme for Three Dimensional Wireless Sensor Networks Using GPS Enabled Mobile Sensor Nodes
Vibha Yadav, Manas Kumar Mishra, A. K. Singh, and M. M. Gore , Motilal Nehru National Institute of Technology

111 performance analysis of MANET under blackhole attack
Anu Bala, Jagpreet singh, Munish Banasal , Punjab university,India

112 Service Coverage Bounds Through Efficient Load Approximation in UMTS Network Planning
Sasthi Ghosh,Roger Whitaker, Stuart Allen and Steve Hurley , 1 Cardiff University, UK

113 Secure Mobile Multicast Handoff Mechanisms using a Time-limited key
Miyeon Yoon, Mijoo Kim,Kwangkyum Lee, Yongtae Shin , Korea Information Security Agency Soongsil University Korea

114 A Middleware Architectural framework for Vehicle Safety over VANET
K. Saravanan, Arunkumar Thangavelu , VIT University

116 AN ENERGY-CONSERVING TOPOLOGY MAINTENANCE ALGORITHM FOR MANETS
S.Muthuramalingam B.Bavya P.Janani R.Rajaram , TCE,India

117 Node Mobility support scheme between the mobile network and PMIPv6 networks
Hyo-Beom Lee, Youn-Hee Han, Sung-Gi Min , Korea University Korea University of Technology and Education, S.Korea

119 A New Algorithm of Self Organization in Wireless Sensor Network
Hemanta Kumar Kalita, and Avijit Kar , Jadavpur University

121 A Tunnel Compress Scheme for PMIPv6-based Nested NEMO
Min-Soo Woo, Hyo-Beom Lee, Youn-Hee Han, Sung-Gi Min , Korea University Korea University of technology and education

127 An Approach for Security Assessment of Network Configurations using Attack Graph
Nirnay Ghosh, S. K. Ghosh , Indian Institute of Technology, Kharagpur, India

129 Agent Based Web Services with RuleML for Network Management
Mydhili K Nair, V Gopalakrishna , M S Ramaiah Institute of Technology Integra Micro Systems, Bangalore, India

130 Posture-Predictive Power Control in Body Sensor Networks using Linear-Quadratic Gaussian Control
Muhannad Quwaider, Azizah Muhammad, Jongeun Choi, and Subir Biswas , Michigan State University USA

131 Galaxia: A Semi-Decentralized System for Implementing Secure-Group P2P Networks
Saurav Muralidharan, Sajin Koroth, Nevil Anto, Rafeeque P.C , Govt. College of Engineering, Kannur

132 A Genetic Algorithm Based Oblivious Image Watermarking Scheme using Singular Value Decomposition
Jagadeesh Bandi,Srinivaskumar S, Raja Rajeswari K , JNTU Kakinada, Kakinada, India, Andhra University,Visakhapatnam, India

133 Improved Optimal Searching Techniques in Distributed P2P networks using Guided Protocol Approach
S.Bhaskaran , SASTRA University,India

134 COMPARATIVE STUDY OF VARIOUS COOLING SCHEDULES FOR LOCATION AREA PLANNING IN CELLULAR NETWORKS USING SIMULATED ANNEALING
Nilesh Prajapati, Rupal Agravat, Mosin Hasan , B.V.M. Engineering College, V.V.Nagar,India

136 An Analytical Model of Multi-Service Call Admission Control in Next Generation Wireless Overlay Networks
Asish K Mukhopadhyay, Sajal Saha, Suranjan Ghose, Debashis Saha , Jadavpur University, Kolkata IIM Calcutta

137 ìVoIP: CrossLayer Optimization of bufferoperations for providing secure VoIP services on constrained embedded devices
Dinil.D1, Aravind.P.A1, Thothadri Rajesh1, Aravind.P1, Anand.R1, Br. Jayaraj P* , Amrita Vishwa Vidyapeetham,India

138 Energy based Quantization for Image Compression using Contourlet Transform
Kilari Veeraswamy,Y.V.Bhaskar Reddy, B.Chandra Mohan, S.Srinivas Kumar , JNTU Kakinada, Kakinada, India.

140 An Improved Method of Detecting Spoofed Attack in Wireless LAN
Shikha Goel & Sudesh Kumar  , , PEC University of Technology, Chandigarh,India

142 Wireless Sensor Network Security Analysis
Hemanta Kumar Kalita, and Avijit Kar , Jadavpur University

143 A Status Monitoring System Design/Implementation for Home Appliances controlled by home server
Boyoung Lee, Deokjai Choi , chonnam university Chonnam National University Korea

149 Cross-Layer Interference Avoidance MAC Protocol for Dense Wireless Sensor Networks
Behnam Dezfouli1, Marjan Radi2, Mohamad A. Nematbakhsh3 , Azad University of Najafabad Iran

168 "Reminder: please update your details”: Phishing Trends
Cynthia.D & Jae Kwang Lee , Hannam University,South Korea

Workshop Papers

GRAPH-HOC 09

006 On Some Sufficient Conditions for Distributed Quality of Service Support in Wireless Networks
Ashwin Ganesan,, K. J. Somaiya College of Engineering, Mumbai, India

007 On a Local Heuristic for a Reverse Multicast Forwarding Game
Sarvesh Varatharajan and Gunes Ercal-Ozkaya, , University of Kansas, USA

008 Random Key Graphs: Can they be Small Worlds?
Osman Yagan and Armand M. Makowski, , University of Maryland at College Park, USA

010 Semi-Pruning for Information Dissemination in Mobile Ad hoc Networks
Kiran K. Somasundaram and John S. Baras, , University of Maryland, College Park, USA

016 K Bipartite Partitioning Algorithm for Channel Allocation Problem in Wireless Mesh Networks
Rajiv Misra, Indian Institute of Technology - Patna, India; Ajay Shukla,, Institute of Engineering and Technology - Sitapur, India

019 A Graph based Approach to Supporting Reconfiguration in Wireless Sensor Networks
Wouter Horre,Kevin Lee, Danny Hughes, Sam Michiels, Wouter Joosen Katholieke Universiteit Leuven, Belgium;
University of Mannheim, Germany


WiMONe 2009

wim 015 An Approach to find the Fermat point for Energy Efficient Geocast Routing Protocols
Kaushik Ghosh, Sarbani Roy, Pradip K. Das, St. Thomas' College of Engineering and Technology , Kolkata, India

wim 017 Analysis of Hierarchical Mobile IP Based Mobility Management Schemes
Sajal Saha, Subhasree Bhattacharjee, Rajib Nath Bhowmick, Asish K Mukhopadhyay, Dept. of Computer Application, Narula Institute of Technology, Kolkata, India.

wim 020 Efficient Power-Aware Packet Scheduling for Multiantenna Packet Radio Systems
Stanislav Nonchev and Mikko Valkama, Tampere University of Technology,Department of Communications Engineering, Tampere, FINLAND

wim 022 Time domain equalization technique using RAKE-MMSE receivers for high data rate UWB communication system
Susmita Das, IEEE Member and Bikramaditya Das, Department of Electrical Engineering, National Institute of Technology, Rourkela

wim 023 Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols
Gaurav Kapoor and Selwyn Piramuthu, Information Systems and Operations Management, University of
Florida, Gainesville, Florida 32611-7169, USA


wim 025 Anomaly Behavior Analysis for Web Page Inspection
Chia-Mei Chen , National Sun Yat-Sen University,Taiwan

wim 026 Fairness Strategy and Scheduling Algorithm for IEEE 802.16 Wireless Access Systems (
Sheng-Tzong Cheng, Bo-Fu Chen, and Chih-Lun Chou, 2 National Cheng Kung University, Tainan, Taiwan


NCS 2009

NCS 001 Fuzzy Switching Controller for the Security in 802.11 Networks
Xu Huang, Dharmendra Sharma ,University of Canberra, Canberra, Act 2601 Australia

NCS 003 Performance Evaluation of ADV with AODV For Mobile Ad-Hoc Networks
A. Nagaraju , CH.Ramya Krishna , Kamala Institute of Technology & Science, Huzurabad,India

NCS 012 An Agent based security framework for protecting Network Layer operations in MANET
N.Jaisankar, R.Saravanan, Dr. K. Durai Samy , School of Computing Sciences, VIT University, Tamilnadu, India

NCS 014 An Improved Collaborative Recommender System
M.K.Kavitha Devi, Dr.P.Venkatesh, Thiagarajar College of Engineering, Madurai, India

NCS 015 A Mobility Management Solution to Support Mobile Station in Wireless Mesh Networks
Jilong Li, Kijun Han, Department of Computer Engineering,Kyungpook National University,Daegu, Korea

NCS 017 An Efficient Routing Protocol based on Position Information in Mobile Sensor Networks
Kihyun Kim and Kijun Han, Kyungpook National University Department,Electrical Engineering and Computer Science,Daegu, Korea

NCS 019 A Routing Metric for Efficient Load Balance in Wireless Mesh Networks
Sooyeol Yang, Kijun Han, Department of Computer Engineering,Kyungpook National University,Daegu, Korea

NCS 021 A self-adjustable rate control mechanism for congestion avoidance in wireless sensor networks
Young-mi Beak and Ki-jun Han, Dept. of Computer Engineering,Kyungpook National University, Daegu, Korea

NCS 023 Simulation Based Performance Comparison of Community Model, GFMM,RPGM, Manhattan Model and RWP-SS Mobility Models in MANET
Gowrishankar.S, T.G.Basavaraju 2, SubirKumarSarkar, Department of Electronics and Telecommunication Engineering,Jadavpur University, Kolkata,West Bengal, India. 2National Institute of Technology Karnataka (NITK), India.

NCS 025 iMeasure Security (iMS): A Novel Framework for Security Quantification
Vijayaraghavan V and Sanjoy Paul, SETLabs, Infosys Technologies Limited, Bangalore, India.

NCS 027 Supporting Negative Authorization in Spatiotemporal Role Based Access Control
Samrat Mondal, Shamik Sural, School of Information Technology, IIT Kharagpur, India

NCS 029 A Framework for Licensed Digital Signatures
Alper Ugur, Ibrahim Sogukpinar, Network and Information Security Lab., Gebze Institute of Technology, Kocaeli,Turkey

NCS 031 Packet Marking With Distance Based Probabilities for IP Traceback
Turker Akyuz , Ibrahim Sogukpinar, Gebze Institute of Technology,Turkey


NCS 042 Crowd Management with RFID & Wireless Technologies
Mohammad Yamin,Yasser Ades University of Canberra ACT 2601 Australia,University of Greenwich, UK