Monday, July 1, 2013

NS2 Project Titles, NS2 Project Abstracts, NS2 IEEE Project Abstracts, NS2 Projects abstracts for CSE IT MCA, Download NS2 Titles, Download NS2 Project Abstracts, Download IEEE NS2 Abstracts

NS2 PROJECT - ABSTRACTS
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks 
DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood the victim site with massive packets. 
Moreover, in Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors) into flushing packets to the victim. But most of current DRDoS detection mechanisms are associated with specific protocols and cannot be used for unknown protocols. 
It is found that because of being stimulated by the same attacking flow, the responsive flows from reflectors have inherent relations: the packet rate of one converged responsive flow may have linear relationships with another. Based on this observation, the Rank Correlation based Detection (RCD) algorithm is proposed. 
The preliminary simulations indicate that RCD can differentiate reflection flows from legitimate ones efficiently and effectively, thus can be used as a useable indicator for DRDoS.


A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks
This paper proposes the first resource allocation scheme in the literature to support scalable-video multicast for WiMAX relay networks. 
We prove that when the available bandwidth is limited, the bandwidth allocation problems of 1) maximizing network throughput and 2) maximizing the number of satisfied users are NP-hard. To find the near-optimal solutions to this type of maximization problem in polynomial time, this study first proposes a greedy weighted algorithm, GWA, for bandwidth allocation. By incorporating table-consulting mechanisms, the proposed GWA can intelligently avoid redundant bandwidth allocation and thus accomplish high network performance (such as high network throughput or large number of satisfied users). 
To maintain the high performance gained by GWA and simultaneously improve its worst case performance, this study extends GWA to a bounded version, BGWA, which guarantees that its performance gains are lower bounded. 
This study shows that the computational complexity of BGWA is also in polynomial time and proves that BGWA can provide at least 1/ρ times the performance of the optimal solution, where \rho is a finite value no less than one. Finally, simulation results show that the proposed BGWA bandwidth allocation scheme can effectively achieve different performance objectives with different parameter settings.


Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
In geographic routing, nodes need to maintain up-to-date positions of their immediate neighbors for making effective forwarding decisions. Periodic broadcasting of beacon packets that contain the geographic location coordinates of the nodes is a popular method used by most geographic routing protocols to maintain neighbor positions. 
We contend and demonstrate that periodic beaconing regardless of the node mobility and traffic patterns in the network is not attractive from both update cost and routing performance points of view. We propose the Adaptive Position Update (APU) strategy for geographic routing, which dynamically adjusts the frequency of position updates based on the mobility dynamics of the nodes and the forwarding patterns in the network. 
APU is based on two simple principles: 1) nodes whose movements are harder to predict update their positions more frequently (and vice versa), and (ii) nodes closer to forwarding paths update their positions more frequently (and vice versa). 
Our theoretical analysis, which is validated by NS2 simulations of a well-known geographic routing protocol, Greedy Perimeter Stateless Routing Protocol (GPSR), shows that APU can significantly reduce the update cost and improve the routing performance in terms of packet delivery ratio and average end-to-end delay in comparison with periodic beaconing and other recently proposed updating schemes. 
The benefits of APU are further confirmed by undertaking evaluations in realistic network scenarios, which account for localization error, realistic radio propagation, and sparse network.


ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs 
Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. However, existing anonymous routing protocols relying on either hop-by-hop encryption or redundant traffic, either generate high cost or cannot provide full anonymity protection to data sources, destinations, and routes. 
The high cost exacerbates the inherent resource constraint problem in MANETs especially in multimedia wireless applications. To offer high anonymity protection at a low cost, we propose an Anonymous Location-based Efficient Routing proTocol (ALERT). ALERT dynamically partitions the network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a nontraceable anonymous route. In addition, it hides the data initiator/receiver among many initiators/receivers to strengthen source and destination anonymity protection. 
Thus, ALERT offers anonymity protection to sources, destinations, and routes. It also has strategies to effectively counter intersection and timing attacks. We theoretically analyze ALERT in terms of anonymity and efficiency. 
Experimental results exhibit consistency with the theoretical analysis, and show that ALERT achieves better route anonymity protection and lower cost compared to other anonymous routing protocols. Also, ALERT achieves comparable routing efficiency to the GPSR geographical routing protocol.


An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
Address assignment is a key challenge in ad hoc networks due to the lack of infrastructure. Autonomous addressing protocols require a distributed and self-managed mechanism to avoid address collisions in a dynamic network with fading channels, frequent partitions, and joining/leaving nodes. 
We propose and analyze a lightweight protocol that configures mobile ad hoc nodes based on a distributed address database stored in filters that reduces the control load and makes the proposal robust to packet losses and network partitions. 
We evaluate the performance of our protocol, considering joining nodes, partition merging events, and network initialization. Simulation results show that our protocol resolves all the address collisions and also reduces the control traffic when compared to previously proposed protocols.


Analysis of Distance-Based Location Management in Wireless Communication Networks 
The performance of dynamic distance-based location management schemes (DBLMS) in wireless communication networks is analyzed. A Markov chain is developed as a mobility model to describe the movement of a mobile terminal in 2D cellular structures. The paging area residence time is characterized for arbitrary cell residence time by using the Markov chain. The expected number of paging area boundary crossings and the cost of the distance-based location update method are analyzed by using the classical renewal theory for two different call handling models. 
For the call plus location update model, two cases are considered. In the first case, the intercall time has an arbitrary distribution and the cell residence time has an exponential distribution. In the second case, the intercall time has a hyper-Erlang distribution and the cell residence time has an arbitrary distribution. 
 the call without location update model, both intercall time and cell residence time can have arbitrary distributions. Our analysis makes it possible to find the optimal distance threshold that minimizes the total cost of location management in a DBLMS.


Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks 
Back-pressure-based adaptive routing algorithms where each packet is routed along a possibly different path have been extensively studied in the literature. However, such algorithms typically result in poor delay performance and involve high implementation complexity. In this paper, we develop a new adaptive routing algorithm built upon the widely studied back-pressure algorithm. 
We decouple the routing and scheduling components of the algorithm by designing a probabilistic routing table that is used to route packets to per-destination queues. The scheduling decisions in the case of wireless networks are made using counters called shadow queues. 
The results are also extended to the case of networks that employ simple forms of network coding. In that case, our algorithm provides a low-complexity solution to optimally exploit the routing-coding tradeoff.


BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET's City Environments 
Using advanced wireless local area network technologies, vehicular ad hoc networks (VANETs) have become viable and valuable for their wide variety of novel applications, such as road safety, multimedia content sharing, commerce on wheels, etc. Multihop information dissemination in VANETs is constrained by the high mobility of vehicles and the frequent disconnections. 
Currently, geographic routing protocols are widely adopted for VANETs as they do not require route construction and route maintenance phases. Again, with connectivity awareness, they perform well in terms of reliable delivery. To obtain destination position, some protocols use flooding, which can be detrimental in city environments. 
Further, in the case of sparse and void regions, frequent use of the recovery strategy elevates hop count. Some geographic routing protocols adopt the minimum weighted algorithm based on distance or connectivity to select intermediate intersections. However, the shortest path or the path with higher connectivity may include numerous intermediate intersections. 
As a result, these protocols yield routing paths with higher hop count. In this paper, we propose a hop greedy routing scheme that yields a routing path with the minimum number of intermediate intersection nodes while taking connectivity into consideration. Moreover, we introduce back-bone nodes that play a key role in providing connectivity status around an intersection. 
Apart from this, by tracking the movement of source as well as destination, the back-bone nodes enable a packet to be forwarded in the changed direction. Simulation results signify the benefits of the proposed routing strategy in terms of high packet delivery ratio and shorter end-to-end delay.


Capacity of Hybrid Wireless Mesh Networks with Random APs 
In conventional Wireless Mesh Networks (WMNs), multihop relays are performed in the backbone comprising of interconnected Mesh Routers (MRs) and this causes capacity degradation. 
This paper proposes a hybrid WMN architecture that the backbone is able to utilize random connections to Access Points (APs) of Wireless Local Area Network (WLAN). In such a proposed hierarchal architecture, capacity enhancement can be achieved by letting the traffic take advantage of the wired connections through APs. 
Theoretical analysis has been conducted for the asymptotic capacity of three-tier hybrid WMN, where per-MR capacity in the backbone is first derived and per-MC capacity is then obtained. Besides related to the number of MR cells as a conventional WMN, the analytical results reveal that the asymptotic capacity of a hybrid WMN is also strongly affected by the number of cells having AP connections, the ratio of access link bandwidth to backbone link bandwidth, etc. 
Appropriate configuration of the network can drastically improve the network capacity in our proposed network architecture. It also shows that the traffic balance among the MRs with AP access is very important to have a tighter asymptotic capacity bound. The results and conclusions justify the perspective of having such a hybrid WMN utilizing widely deployed WLANs.


Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks 
Many efforts have been devoted to maximizing network throughput in a multichannel multiradio wireless mesh network. Most current solutions are based on either purely static or purely dynamic channel allocation approaches. 
In this paper, we propose a hybrid multichannel multiradio wireless mesh networking architecture, where each mesh node has both static and dynamic interfaces. We first present an Adaptive Dynamic Channel Allocation protocol (ADCA), which considers optimization for both throughput and delay in the channel assignment. 
In addition, we also propose an Interference and Congestion Aware Routing protocol (ICAR) in the hybrid network with both static and dynamic links, which balances the channel usage in the network. 
Our simulation results show that compared to previous works, ADCA reduces the packet delay considerably without degrading the network throughput. The hybrid architecture shows much better adaptivity to changing traffic than purely static architecture without dramatic increase in overhead, and achieves lower delay than existing approaches for hybrid networks.


Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks 
In this study, random incomplete coloring (RIC) with low time-complexity and high spatial reuse is proposed to overcome in-between wireless-body-area-networks (WBAN) interference, which can cause serious throughput degradation and energy waste. Interference-avoidance scheduling of wireless networks can be modeled as a problem of graph coloring. 
For instance, high spatial-reuse scheduling for a dense sensor network is mapped to high spatial-reuse coloring; fast convergence scheduling for a mobile ad hoc network (MANET) is mapped to low time-complexity coloring. 
However, for a dense and mobile WBAN, inter-WBAN scheduling (IWS) should simultaneously satisfy both of the following requirements: 1) high spatial-reuse and 2) fast convergence, which are tradeoffs in conventional coloring. By relaxing the coloring rule, the proposed distributed coloring algorithm RIC avoids this tradeoff and satisfies both requirements. 
Simulation results verify that the proposed coloring algorithm effectively overcomes inter-WBAN interference and invariably supports higher system throughput in various mobile WBAN scenarios compared to conventional colorings.


Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks
Abstract
We study the cross-layer design of congestion control and power allocation with outage constraint in an interference-limited multihop wireless networks. Using a complete-convexification method, we first propose a message-passing distributed algorithm that can attain the global optimal source rate and link power allocation. Despite the attractiveness of its optimality, this algorithm requires larger message size than that of the conventional scheme, which increases network overheads. 
Using the bounds on outage probability, we map the outage constraint to an SIR constraint and continue developing a practical near-optimal distributed algorithm requiring only local SIR measurement at link receivers to limit the size of the message. Due to the complicated complete-convexification method, however the congestion control of both algorithms no longer preserves the existing TCP stack. 
To take into account the TCP stack preserving property, we propose the third algorithm using a successive convex approximation method to iteratively transform the original nonconvex problem into approximated convex problems, then the global optimal solution can converge distributively with message-passing. Thanks to the tightness of the bounds and successive approximations, numerical results show that the gap between three algorithms is almost indistinguishable. 
Despite the same type of the complete-convexification method, the numerical comparison shows that the second near-optimal scheme has a faster convergence rate than that of the first optimal one, which make the near-optimal scheme more favorable and applicable in practice. Meanwhile, the third optimal scheme also has a faster convergence rate than that of a previous work using logarithm successive approximation method.


DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks
ABSTRACT:
This paper proposes distributed cache invalidation mechanism (DCIM), a client-based cache consistency scheme that is implemented on top of a previously proposed architecture for caching data items in mobile ad hoc networks (MANETs), namely COACS, where special nodes cache the queries and the addresses of the nodes that store the responses to these queries. 
We have also previously proposed a server-based consistency scheme, named SSUM, whereas in this paper, we introduce DCIM that is totally client-based. DCIM is a pull-based algorithm that implements adaptive time to live (TTL), piggybacking, and prefetching, and provides near strong consistency capabilities. 
Cached data items are assigned adaptive TTL values that correspond to their update rates at the data source, where items with expired TTL values are grouped in validation requests to the data source to refresh them, whereas unexpired ones but with high request rates are prefetched from the server. 
In this paper, DCIM is analyzed to assess the delay and bandwidth gains (or costs) when compared to polling every time and push-based schemes. DCIM was also implemented using ns2, and compared against client-based and server-based schemes to assess its performance experimentally. The consistency ratio, delay, and overhead traffic are reported versus several variables, where DCIM showed to be superior when compared to the other systems.


Delay Optimal Broadcast for Multihop Wireless Networks using Self –Interference Cancellation
Conventional wireless broadcast protocols rely heavily on the 802.11-based CSMA/CA model, which avoids interference and collision by conservative scheduling of transmissions. While CSMA/CA is amenable to multiple concurrent unicasts, it tends to degrade broadcast performance significantly, especially in lossy and large-scale networks. 
In this paper, we propose a new protocol called Chorus that improves the efficiency and scalability of broadcast service with a MAC/PHY layer that allows packet collisions. Chorus is built upon the observation that packets carrying the same data can be effectively detected and decoded, even when they overlap with each other and have comparable signal strengths. 
It resolves collision using symbol-level interference cancellation, and then combines the resolved symbols to restore the packet. Such a collision-tolerant mechanism significantly improves the transmission diversity and spatial reuse in wireless broadcast. Chorus' MAC-layer cognitive sensing and scheduling scheme further facilitates the realization of such an advantage, resulting in an asymptotic broadcast delay that is proportional to the network radius. 
We evaluate Chorus' PHY-layer collision resolution mechanism with symbol-level simulation, and validate its network-level performance via ns-2, in comparison with a typical CSMA/CA-based broadcast protocol. Our evaluation validates Chorus's superior performance with respect to scalability, reliability, delay, etc., under a broad range of network scenarios (e.g., single/multiple broadcast sessions, static/mobile topologies).


Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. 
In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. 
We then formulate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, we explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. 
In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. 
Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries.


Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 
A growing number of ad hoc networking protocols and location-aware services require that mobile nodes learn the position of their neighbors. However, such a process can be easily abused or disrupted by adversarial nodes. 
In absence of a priori trusted nodes, the discovery and verification of neighbor positions presents challenges that have been scarcely investigated in the literature. In this paper, we address this open issue by proposing a fully distributed cooperative solution that is robust against independent and colluding adversaries, and can be impaired only by an overwhelming presence of adversaries. 
Results show that our protocol can thwart more than 99 percent of the attacks under the best possible conditions for the adversaries, with minimal false positive rates.


Distance Bounding: A Practical Security Solution for Real-Time Location Systems 
The need for implementing adequate security services in industrial applications is increasing. Verifying the physical proximity or location of a device has become an important security service in ad-hoc wireless environments. 
Distance-bounding is a prominent secure neighbor detection method that cryptographically determines an upper bound for the physical distance between two communicating parties based on the round-trip time of cryptographic challenge-response pairs. 
This paper gives a brief overview of distance-bounding protocols and discusses the possibility of implementing such protocols within industrial RFID and real-time location applications, which requires an emphasis on aspects such as reliability and real-time communication. 
The practical resource requirements and performance tradeoffs involved are illustrated using a sample of distance-bounding proposals, and some remaining research challenges with regards to practical implementation are discussed.


Distributed Cooperative Caching in Social Wireless Networks 
This paper introduces cooperative caching policies for minimizing electronic content provisioning cost in Social Wireless Networks (SWNET). SWNETs are formed by mobile devices, such as data enabled phones, electronic book readers etc., sharing common interests in electronic content, and physically gathering together in public places. 
Electronic object caching in such SWNETs are shown to be able to reduce the content provisioning cost which depends heavily on the service and pricing dependences among various stakeholders including content providers (CP), network service providers, and End Consumers (EC). 
Drawing motivation from Amazon's Kindle electronic book delivery business, this paper develops practical network, service, and pricing models which are then used for creating two object caching strategies for minimizing content provisioning costs in networks with homogenous and heterogeneous object demands. 
The paper constructs analytical and simulation models for analyzing the proposed caching strategies in the presence of selfish users that deviate from network-wide cost-optimal policies. It also reports results from an Android phone-based prototype SWNET, validating the presented analytical and simulation results.


EAACK—A Secure Intrusion-Detection System for MANETs 
The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. 
Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. 
However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. 
To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.


Efficient Algorithms for Neighbor Discovery in Wireless Networks 
Neighbor discovery is an important first step in the initialization of a wireless ad hoc network. In this paper, we design and analyze several algorithms for neighbor discovery in wireless networks. Starting with a single-hop wireless network of n nodes, we propose a Θ(nlnn) ALOHA-like neighbor discovery algorithm when nodes cannot detect collisions, and an order-optimal Θ(n) receiver feedback-based algorithm when nodes can detect collisions. Our algorithms neither require nodes to have a priori estimates of the number of neighbors nor synchronization between nodes. 
Our algorithms allow nodes to begin execution at different time instants and to terminate neighbor discovery upon discovering all their neighbors. We finally show that receiver feedback can be used to achieve a Θ(n) running time, even when nodes cannot detect collisions. 
We then analyze neighbor discovery in a general multihop setting. We establish an upper bound of O(Δlnn) on the running time of the ALOHA-like algorithm, where Δ denotes the maximum node degree in the network and n the total number of nodes. 
We also establish a lower bound of Ω(Δ+lnn) on the running time of any randomized neighbor discovery algorithm. Our result thus implies that the ALOHA-like algorithm is at most a factor min(Δ,lnn) worse than optimal.


Enhanced OLSR for defense against DOS attack in ad hoc networks 
Mobile ad hoc networks (MANET) refers to a network designed for special applications for which it is difficult to use a backbone network. In MANETs, applications are mostly involved with sensitive and secret information. Since MANET assumes a trusted environment for routing, security is a major issue. 
In this paper we analyze the vulnerabilities of a pro-active routing protocol called optimized link state routing (OLSR) against a specific type of denial-of-service (DOS) attack called node isolation attack. Analyzing the attack, we propose a mechanism called enhanced OLSR (EOLSR) protocol which is a trust based technique to secure the OLSR nodes against the attack. 
Our technique is capable of finding whether a node is advertising correct topology information or not by verifying its Hello packets, thus detecting node isolation attacks. 
The experiment results show that our protocol is able to achieve routing security with 45% increase in packet delivery ratio and 44% reduction in packet loss rate when compared to standard OLSR under node isolation attack. Our technique is light weight because it doesn't involve high computational complexity for securing the network.


Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 
We study the ubiquitous data collection for mobile users in wireless sensor networks. People with handheld devices can easily interact with the network and collect data. We propose a novel approach for mobile users to collect the network-wide data. 
The routing structure of data collection is additively updated with the movement of the mobile user. With this approach, we only perform a limited modification to update the routing structure while the routing performance is bounded and controlled compared to the optimal performance. 
The proposed protocol is easy to implement. Our analysis shows that the proposed approach is scalable in maintenance overheads, performs efficiently in the routing performance, and provides continuous data delivery during the user movement. 
We implement the proposed protocol in a prototype system and test its feasibility and applicability by a 49-node testbed. We further conduct extensive simulations to examine the efficiency and scalability of our protocol with varied network settings.


Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling 
As Cyber-Physical-Systems (CPSs) evolve they will be increasingly relied on to support time-critical and performance-intensive monitoring and control activities. Further, many CPSs that utilize Wireless Sensor Networking (WSN) technologies will require the use of energy harvesting methods to extend their lifetimes. 
For this application class, there are currently few algorithmic techniques that combine performance sensitive processing and communication with efficient management techniques for energy harvesting. Our paper addresses this problem. We first propose a general purpose, multihop WSN architecture capable of supporting time-critical CPS systems using energy harvesting. We then present a set of Harvesting Aware Speed Selection (HASS) algorithms. 
Our technique maximizes the minimum energy reserve for all the nodes in the network, thus ensuring highly resilient performance under emergency or fault-driven situations. We present an optimal centralized solution, along with an efficient, distributed solution. 
We propose a CPS-specific experimental methodology, enabling us to evaluate our approach. Our experiments show that our algorithms yield significantly higher energy reserves than baseline methods.


In-Network Estimation with Delay Constraints in Wireless Sensor Networks 
The use of wireless sensor networks (WSNs) for closing the loops between the cyberspace and the physical processes is more attractive and promising for future control systems. For some real-time control applications, controllers need to accurately estimate the process state within rigid delay constraints. In this paper, we propose a novel in-network estimation approach for state estimation with delay constraints in multihop WSNs. 
For accurately estimating a process state as well as satisfying rigid delay constraints, we address the problem through jointly designing in-network estimation operations and an aggregation scheduling algorithm. 
Our in-network estimation operation performed at relays not only optimally fuses the estimates obtained from the different sensors but also predicts the upper stream sensors' estimates which cannot be aggregated to the sink before deadlines. 
Our estimate aggregation scheduling algorithm, which is interference free, is able to aggregate as much estimate information as possible from the network to the sink within delay constraints. We proved the unbiasedness of in-network estimation, and theoretically analyzed the optimality of our approach. 
Our simulation results corroborate our theoretical results and show that our in-network estimation approach can obtain significant estimation accuracy gain under different network settings.


Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 
Wireless Sensor Networks (WSNs) are increasingly used in data-intensive applications such as microclimate monitoring, precision agriculture, and audio/video surveillance. A key challenge faced by data-intensive WSNs is to transmit all the data generated within an application's lifetime to the base station despite the fact that sensor nodes have limited power supplies. 
We propose using low-cost disposable mobile relays to reduce the energy consumption of data-intensive WSNs. Our approach differs from previous work in two main aspects. 
First, it does not require complex motion planning of mobile nodes, so it can be implemented on a number of low-cost mobile sensor platforms. Second, we integrate the energy consumption due to both mobility and wireless transmissions into a holistic optimization framework. Our framework consists of three main algorithms. The first algorithm computes an optimal routing tree assuming no nodes can move. 
The second algorithm improves the topology of the routing tree by greedily adding new nodes exploiting mobility of the newly added nodes. The third algorithm improves the routing tree by relocating its nodes without changing its topology. This iterative algorithm converges on the optimal position for each node given the constraint that the routing tree topology does not change. 
We present efficient distributed implementations for each algorithm that require only limited, localized synchronization. Because we do not necessarily compute an optimal topology, our final routing tree is not necessarily optimal. However, our simulation results show that our algorithms significantly outperform the best existing solutions


Model-Based Analysis of Wireless System Architectures for Real-Time Applications 
We propose a model-based description and analysis framework for the design of wireless system architectures. Its aim is to address the shortcomings of existing approaches to system verification and the tracking of anomalies in safety-critical wireless systems. We use Architecture Analysis and Description Language (AADL) to describe an analysis-oriented architecture model with highly modular components. 
We also develop the cooperative tool chains required to analyze the performance of a wireless system by simulation. We show how this framework can support a detailed and largely automated analysis of a complicated, networked wireless system using examples from wireless healthcare and video broadcasting.


Network Traffic Classification Using Correlation Information 
Traffic classification has wide applications in network management, from security monitoring to quality of service measurements. Recent research tends to apply machine learning techniques to flow statistical feature based classification methods. The nearest neighbor (NN)-based method has exhibited superior classification performance. 
It also has several important advantages, such as no requirements of training procedure, no risk of overfitting of parameters, and naturally being able to handle a huge number of classes. However, the performance of NN classifier can be severely affected if the size of training data is small. 
In this paper, we propose a novel nonparametric approach for traffic classification, which can improve the classification performance effectively by incorporating correlated information into the classification process. We analyze the new classification approach and its performance benefit from both theoretical and empirical perspectives. 
A large number of experiments are carried out on two real-world traffic data sets to validate the proposed approach. The results show the traffic classification performance can be improved significantly even under the extreme difficult circumstance of very few training samples.


On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 
Unpredictable node mobility, low node density, and lack of global information make it challenging to achieve effective data forwarding in Delay-Tolerant Networks (DTNs). Most of the current data forwarding schemes choose the nodes with the best cumulative capability of contacting others as relays to carry and forward data, but these nodes may not be the best relay choices within a short time period due to the heterogeneity of transient node contact characteristics. 
In this paper, we propose a novel approach to improve the performance of data forwarding with a short time constraint in DTNs by exploiting the transient social contact patterns. These patterns represent the transient characteristics of contact distribution, network connectivity and social community structure in DTNs, and we provide analytical formulations on these patterns based on experimental studies of realistic DTN traces. 
We then propose appropriate forwarding metrics based on these patterns to improve the effectiveness of data forwarding. When applied to various data forwarding strategies, our proposed forwarding metrics achieve much better performance compared to existing schemes with similar forwarding cost.


Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power
ABSTRACT:
Opportunistic mobile ad hoc networks (MANETs) are a special class of sparse and disconnected MANETs where data communication exploits sporadic contact opportunities among nodes. We consider opportunistic MANETs where nodes move independently at random over a square of the plane. 
Nodes exchange data if they are at a distance at most within each other, where is the node transmission radius. The flooding time is the number of time-steps required to broadcast a message from a source node to every node of the network. 
Flooding time is an important measure of how fast information can spread in dynamic networks. We derive the first upper bound on the flooding time, which is a decreasing function of the maximal speed of the nodes. 
The bound holds with high probability, and it is nearly tight. Our bound shows that, thanks to node mobility, even when the network is sparse and disconnected, information spreading can be fast.


Optimal multicast capacity and delay tradeoffs in MANETs: A global perspective 
In this paper, we give a global perspective of multicast capacity and delay analysis in Mobile Ad-hoc Networks (MANETs). 
Specifically, we consider two node mobility models: (1) two-dimensional i.i.d. mobility, (2) one-dimensional i.i.d. mobility. Two mobility time-scales are included in this paper: (i) Fast mobility where node mobility is at the same time-scale as data transmissions; (ii) Slow mobility where node mobility is assumed to occur at a much slower time-scale than data transmissions. 
Given a delay constraint D, we first characterize the optimal multicast capacity for each of the four mobility models, and then we develop a scheme that can achieve a capacity-delay tradeoff close to the upper bound up to a logarithmic factor. 
Our study can be further extended to two-dimensional/one-dimensional hybrid random walk fast/slow mobility models and heterogeneous networks.


Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks 
In this letter, we propose a power allocation scheme for statistical quality-of-service (QoS) provisioning in multi-relay decode-and-forward (DF) cognitive networks (CN). By considering the direct link between the source and destination, the CN first chooses the transmission mode (direct transmission or relay transmission) based on the channel state information. 
Then, according to the determined transmission mode, efficient power allocation will be performed under the given QoS requirement, the average transmit and interference power constraints as well as the peak interference constraint. 
Our proposed power allocation scheme indicates that, in order to achieve the maximum throughput, at most two relays can be involved for the transmission. Simulation results show that our proposed scheme outperforms the max-min criterion and equal power allocation policy.


Proteus: Multiflow Diversity Routing for Wireless Networks with Cooperative Transmissions
ABSTRACT:
In this paper, we consider the use of cooperative transmissions in multihop wireless networks to achieve Virtual Multiple Input Single Output (VMISO) links. Specifically, we investigate how the physical layer VMISO benefits translate into network level performance improvements. 
We show that the improvements are nontrivial (15 to 300 percent depending on the node density) but rely on two crucial algorithmic decisions: the number of cooperating transmitters for each link; and the cooperation strategy used by the transmitters. We explore the tradeoffs in making routing decisions using analytical models and derive the key routing considerations. 
Finally, we present Proteus, an adaptive diversity routing protocol that includes algorithmic solutions to the above two decision problems and leverages VMISO links in multihop wireless network to achieve performance improvements. 
We evaluate Proteus using NS2-based simulations with an enhanced physical layer model that accurately captures the effect of VMISO transmissions


Quality-Differentiated Video Multicast in Multirate Wireless Networks 
Adaptation of modulation and transmission bit-rates for video multicast in a multirate wireless network is a challenging problem because of network dynamics, variable video bit-rates, and heterogeneous clients who may expect differentiated video qualities. 
Prior work on the leader-based schemes selects the transmission bit-rate that provides reliable transmission for the node that experiences the worst channel condition. However, this may penalize other nodes that can achieve a higher throughput by receiving at a higher rate. 
In this work, we investigate a rate-adaptive video multicast scheme that can provide heterogeneous clients differentiated visual qualities matching their channel conditions. We first propose a rate scheduling model that selects the optimal transmission bit-rate for each video frame to maximize the total visual quality for a multicast group subject to the minimum-visual-quality-guaranteed constraint. 
We then present a practical and easy-to-implement protocol, called QDM, which constructs a cluster-based structure to characterize node heterogeneity and adapts the transmission bit-rate to network dynamics based on video quality perceived by the representative cluster heads. 
Since QDM selects the rate by a sample-based technique, it is suitable for real-time streaming even without any preprocess. We show that QDM can adapt to network dynamics and variable video-bit rates efficiently, and produce a gain of 2-5 dB in terms of the average video quality as compared to the leader-based approach.


Strategies for Energy-Efficient Resource Management of Hybrid Programming Models
Many scientific applications are programmed using hybrid programming models that use both message passing and shared memory, due to the increasing prevalence of large-scale systems with multicore, multisocket nodes. 
Previous work has shown that energy efficiency can be improved using software-controlled execution schemes that consider both the programming model and the power-aware execution capabilities of the system. However, such approaches have focused on identifying optimal resource utilization for one programming model, either shared memory or message passing, in isolation. 
The potential solution space, thus the challenge, increases substantially when optimizing hybrid models since the possible resource configurations increase exponentially. Nonetheless, with the accelerating adoption of hybrid programming models, we increasingly need improved energy efficiency in hybrid parallel applications on large-scale systems. 
In this work, we present new software-controlled execution schemes that consider the effects of dynamic concurrency throttling (DCT) and dynamic voltage and frequency scaling (DVFS) in the context of hybrid programming models. Specifically, we present predictive models and novel algorithms based on statistical analysis that anticipate application power and time requirements under different concurrency and frequency configurations. 
We apply our models and methods to the NPB MZ benchmarks and selected applications from the ASC Sequoia codes. Overall, we achieve substantial energy savings (8.74 percent on average and up to 13.8 percent) with some performance gain (up to 7.5 percent) or negligible performance loss


Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 
This work studies the problem of tracking signal-emitting mobile targets using navigated mobile sensors based on signal reception. Since the mobile target's maneuver is unknown, the mobile sensor controller utilizes the measurement collected by a wireless sensor network in terms of the mobile target signal's time of arrival (TOA). 
The mobile sensor controller acquires the TOA measurement information from both the mobile target and the mobile sensor for estimating their locations before directing the mobile sensor's movement to follow the target. We propose a min-max approximation approach to estimate the location for tracking which can be efficiently solved via semidefinite programming (SDP) relaxation, and apply a cubic function for mobile sensor navigation. 
We estimate the location of the mobile sensor and target jointly to improve the tracking accuracy. To further improve the system performance, we propose a weighted tracking algorithm by using the measurement information more efficiently. Our results demonstrate that the proposed algorithm provides good tracking performance and can quickly direct the mobile sensor to follow the mobile target.


Toward a Statistical Framework for Source Anonymity in Sensor Networks
In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is, unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless sensor networks, with variety of techniques based on different adversarial assumptions being proposed. 
In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in sensor networks. The novelty of the proposed framework is twofold: first, it introduces the notion of "interval indistinguishability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it maps source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. We then analyze existing solutions for designing anonymous sensor networks using the proposed model. 
We show how mapping source anonymity to binary hypothesis testing with nuisance parameters leads to converting the problem of exposing private source information into searching for an appropriate data transformation that removes or minimize the effect of the nuisance information. 
By doing so, we transform the problem from analyzing real-valued sample points to binary codes, which opens the door for coding theory to be incorporated into the study of anonymous sensor networks. Finally, we discuss how existing solutions can be modified to improve their anonymity.


Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 
Today's location-sensitive service relies on user's mobile device to determine the current location. This allows malicious users to access a restricted resource or provide bogus alibis by cheating on their locations. 
To address this issue, we propose A Privacy-Preserving LocAtion proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server. Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server. 
We also develop user-centric location privacy model in which individual users evaluate their location privacy levels and decide whether and when to accept the location proof requests. In order to defend against colluding attacks, we also present betweenness ranking-based and correlation clustering-based approaches for outlier detection. 
APPLAUS can be implemented with existing network infrastructure, and can be easily deployed in Bluetooth enabled mobile devices with little computation or power cost. Extensive experimental results show that APPLAUS can effectively provide location proofs, significantly preserve the source location privacy, and effectively detect colluding attacks.





FOR MORE ABSTRACTS, IEEE BASE PAPER / REFERENCE PAPERS AND NON IEEE PROJECT ABSTRACTS

CONTACT US
No.109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 600 034
Near Ganpat Hotel, Above IOB, Next to ICICI Bank, Opp to Cakes'n'Bakes
044-2823 5816, 98411 93224, 89393 63501
ncctchennai@gmail.com, ncctprojects@gmail.com 


EMBEDDED SYSTEM PROJECTS IN
Embedded Systems using Microcontrollers, VLSI, DSP, Matlab, Power Electronics, Power Systems, Electrical
For Embedded Projects - 044-45000083, 7418497098 
ncctchennai@gmail.com, www.ncct.in


Project Support Services
Complete Guidance | 100% Result for all Projects | On time Completion | Excellent Support | Project Completion Experience Certificate | Free Placements Services | Multi Platform Training | Real Time Experience


TO GET ABSTRACTS / PDF Base Paper / Review PPT / Other Details
Mail your requirements / SMS your requirements / Call and get the same / Directly visit our Office


WANT TO RECEIVE FREE PROJECT DVD...
Want to Receive FREE Projects Titles, List / Abstracts  / IEEE Base Papers DVD… Walk in to our Office and Collect the same Or

Send your College ID scan copy, Your Mobile No & Complete Postal Address, Mentioning you are interested to Receive DVD through Courier at Free of Cost


Own Projects
Own Projects ! or New IEEE Paper… Any Projects…
Mail your Requirements to us and Get is Done with us… or Call us / Email us / SMS us or Visit us Directly

We will do any Projects…




NS2 Project Titles, NS2 Project Abstracts, NS2 IEEE Project Abstracts, NS2 Projects abstracts for CSE IT MCA, Download NS2 Titles, Download NS2 Project Abstracts, Download IEEE NS2 Abstracts

DSP Project Titles, DSP Project Abstracts, DSP IEEE Project Abstracts, DSP Projects abstracts for CSE IT ECE EEE MCA, Download DSP Titles, Download DSP Project Abstracts, Download IEEE DSP Abstracts

DSP PROJECTS - ABSTRACTS
A 2D Discrete Wavelet Transform Based 7-State Hidden Markov Model for Efficient Face Recognition
A novel Discrete Wavelet Transform (DWT) based on 7-States of Hidden Markov Model (HMM) for Face Recognition (FR) is proposed in this paper. To improve the accuracy of HMM based face recognition algorithm, DWT is used to replace Discrete Cosine Transform (DCT) for observation sequence vectors extraction. 
Extensive experiments have been conducted in our database and the FERET database shows that the proposed method can improve the accuracy significantly, especially when the face database is large and only few training images are available. As a novel point despite of five-state HMM used in pervious researches, we propose to use 7-state HMM to cover more specific details. 
A pre-processing procedure is introduced to reduce the complexity of the proposed system. It is evident from the outcome of these experiments that more information during training yield better results. 


A Fatigue Detection System with Eyeglasses Removal
A fatigue detection system is designed to alert the driver and thus prevent the possible accidents. The detection is mainly based on the result of the face/eye detection or the pupil of the eyeball to determine whether the driver in the fatigue condition or not. Most of the previous studies assume that the driver does not wear the eyeglasses. However, the eye detection is easily influenced by the eyeglasses and thus decreases the correct detection ratio. 
In order to overcome the influence of the eyeglasses, a fatigue detection method with eyeglass removal is proposed in this paper. Firstly, the face area is detected by using the functions in the OpenCV library. Then, the eyeglasses are removed by using the morphological operations. After eyeglasses removal, the eye areas are detected by using the functions in the OpenCV library and tracking by using a template matching method. The binarization result of the eye area is performed the horizontal projection and Kalman filter. 
Then, the open/close state of eyes is determined, and then fatigue is determined based on the series state of eyes. Four testing videos are used to evaluate the performance of the proposed method. The average correct detection ratio of the eye state is 88.5% and the fatigue detection can reach 100%. The preliminary results show that the proposed method is feasible.


A Novel Approach for Face Detection using Artificial Neural Network
In recent time face detection is of utmost importance because for its various applications. Several approaches have been implemented to date. This paper aims towards an effort to represent a novel approach for human face recognition. The proposed system consists merging both frequency and spatial domain techniques. 
The proposed system selects the Region of Interest on which Ripplet Transformation is to be applied after power law transformation to calculate Standard Deviation (SD) and Mean as features. 
At later stage, Feed Forward Back Propagation Neural Network (FFBPNN) is used for classification and recognition purpose. The approach is tested with non face images to show its effectiveness which is around 91.67%.


A Robust QR- Code Video Watermarking Scheme Based On SVD and DWT Composite Domain
Nowadays, Digital video is one of the popular multimedia data exchanged in the internet. Commercial activity on the internet and media require protection to enhance security. The 2D Barcode with a digital watermark is a widely interesting research in the security field. 
In this paper propose a video watermarking with text data (verification message) by using the Quick Response (QR) Code technique. The QR Code is prepared to be watermarked via a robust video watermarking scheme based on the (singular value decomposition)SVD and (Discrete Wavelet Transform)DWT. In addition to that logo (or) watermark gives the authorized ownership of video document. SVD is an attractive algebraic transform for watermarking applications. 
SVD is applied to the cover I-frame. The extracted diagonal value is fused with logo (or) watermark. DWT is applied on SVD cover image and QR code image. The inverse transform on watermarked image and add the frame into video this watermarked (include logo and QR code image) the video file sends to authorized customers. 
In the reverse process check the logo and QR code for authorized ownership. These experimental results can achieved acceptable imperceptibility and certain robustness in video processing. 


A Survey on the Successive Interference Cancellation Performance for Single-Antenna and Multiple-Antenna OFDM Systems
Interference plays a crucial role for performance degradation in communication networks nowadays. An appealing approach to interference avoidance is the Interference Cancellation (IC) methodology. Particularly, the Successive IC (SIC) method represents the most effective IC-based reception technique in terms of Bit-Error-Rate (BER) performance and, thus, yielding to the overall system robustness. 
Moreover, SIC in conjunction with Orthogonal Frequency Division Multiplexing (OFDM), in the context of SIC-OFDM, is shown to approach the Shannon capacity when single-antenna infrastructures are applied while this capacity limit can be further extended with the aid of multiple antennas. 
Recently, SIC-based reception has studied for Orthogonal Frequency and Code Division Multiplexing or (spread-OFDM systems), namely OFCDM. Such systems provide extremely high error resilience and robustness, especially in multi-user environments. In this paper, we present a comprehensive survey on the performance of SIC for single- and multiple-antenna OFDM and spread OFDM (OFCDM) systems. 
Thereby, we focus on all the possible OFDM formats that have been developed so far. We study the performance of SIC by examining closely two major aspects, namely the BER performance and the computational complexity of the reception process, thus striving for the provision and optimization of SIC. 
Our main objective is to point out the state-of-the-art on research activity for SIC-OF(C)DM systems, applied on a variety of well-known network implementations, such as cellular, ad hoc and infrastructure-based platforms. Furthermore, we introduce a Performance-Complexity Tradeoff (PCT) in order to indicate the contribution of the approaches studied in this paper. 
Finally, we provide analytical performance comparison tables regarding to the surveyed techniques with respect to the PCT level.


Adaptive Local Tone Mapping Based on Retinex for High Dynamic Range Images
In this paper, we present a new tone mapping technique for high dynamic range images based on the retinex theory. Our algorithm consists of two steps, global adaptation and local adaptation of the human visual system. 
In the local adaptation process, the Gaussian filter of the retinex algorithms is substituted with a guided filter to reduce halo artifacts. To guarantee good rendition and dynamic range compression, we propose a contrast enhancement factor based on the luminance values of the scene. 
In addition, an adaptive nonlinearity offset is introduced to deal with the strength of the logarithm function's nonlinearity. Experiments show that our algorithm provides satisfactory results while preserving details and reducing halo artifacts.


An Adaptive Blind Video Watermarking Technique based on SD-BPSO and DWT-SVD
Data Exchange in the form of multimedia has seen a tremendous increase in the past decade thereby requiring a need for better security and protection for proprietary rights. Blind Watermarking is a well-established authentication technique and in this paper, we propose a novel algorithm for watermarking videos. 
The proposed concepts include Adaptive Frame Selection using SD-BPSO to ensure the watermarks have least detrimental effects on the video as a whole. The integrity of the video is validated using the Peak Signal to Nose Ratio (PSNR). 
The robustness of the algorithm is also tested by subjecting the videos to several standard attacks such as - rotation, cropping, image shift, histogram equalization and image sharpening. Bit Error Rate (BER) is also used, in order to determine the efficiency of the system in retaining the watermark.


Analysis of Multispectral Image Using Discrete Wavelet Transform
In this paper we have analyzed the discrete wavelet transform of multispectral image of Bareilly region using MatLab tool. The wavelet transform is one of the most useful computational tools for a variety of signal and image processing applications. 
The wavelet transform is used for the compression of digital image because smaller data are important for storing images using less memory and for transmitting images faster and more reliably. Wavelet transforms are useful for images to reduce unwanted noise and blurring. 
A discrete wavelet transform (DWT) is any wavelet transform for which the wavelets are discretely sampled. A key advantage it has over Fourier transforms is temporal resolution: it captures both frequency and time domain information. 


Binary Plane Technique for Super Resolution Image Reconstruction Using Integer Wavelet Transform
Super Resolution (SR) image reconstruction is the process of producing a high resolution (HR) image from many low resolution (LR) images. SR image reconstruction can be considered as the second generation restoration technique. 
In this paper we propose SR image reconstruction from clean, noisy and blurred images using binary plane technique (BPT) encoding and Integer wavelet Transform (IWT). 
Integer wavelet transform maps an integer data set into another integer data set. Objective and subjective analysis of the reconstructed image has a better super resolution factor and a higher qualitative metrics.


Brain Tumor Classification Using Discrete Cosine Transform and Probabilistic Neural Network
In this paper, a new method for Brain Tumor Classification using Probabilistic Neural Network with Discrete Cosine Transformation is proposed. The conventional method for computerized tomography and magnetic resonance brain images classification and tumor detection is by human inspection. 
Operator assisted classification methods are impractical for large amounts of data and are also non reproducible. Computerized Tomography and Magnetic Resonance images contain a noise caused by operator performance which can lead to serious inaccuracies in classification. The use of Neural Network techniques shows great potential in the field of medical diagnosis. 
Hence, in this paper the Probabilistic Neural Network with Discrete Cosine Transform was applied for Brain Tumor Classification. Decision making was performed in two steps, i) Dimensionality reduction and Feature extraction using the Discrete Cosine Transform and ii) classification using Probabilistic Neural Network (PNN). Evaluation was performed on image data base of 20 Brain Tumor images. 
The proposed method gives fast and better recognition rate when compared to previous classifiers. The main advantage of this method is its high speed processing capability and low computational requirements. 


Children Detection Algorithm Based on Statistical Models and LDA in Human Face Images
Advances in different software and systems, and the everyday increasing demand on internet networks highlights the need for a system being able to give service to its clients based on their age. Children and adolescents are the most vulnerable group in the society. Therefore we have to look for an algorithm that can categorize immature from adult. I
n this paper, a practical algorithm in children classification from adults by their facial image is proposed. In this algorithm, statistical modelling of the face is used to extract the age dependent face features and then by applying Linear Discriminant Analysis (LDA) on the face parameters, useful specifications are extracted. 
By transferring into a one dimension feature space Euclidean distance is used as a dissimilarity function. The proposed algorithm obtains accuracy rate of 85% on a standard FG-NET aging face database.


Compare the performance analysis for FFT based MIMO-OFDM with DWT based MIMO-OFDM
In that paper examines the enactment of ripple (otherwise called as wavelet) based Multi-user MIMO OFDM systems and also compare with the performance of FFT based MIMO OFDM. Wavelet based OFDM has lot of advantages compare to the FFT based OFDM. There is no need for cyclic prefix, flexibility and optimal resolution. 
Wavelets want existed suitably in almost absolutely the arenas of wireless communication schemes with OFDM which is a durable applicant for next peers of wireless scheme. That is third generation of partnerships project (3GPP) networks. 
Simulation created examination will be jumble-sale to simulate the double multicarrier schemes, DWT with Haar mother constructed multicarrier in addition the predictable OFDM, less than the consequence of taking multiple antennas scheme, by BPSK also QPSK as dual modulation schemes in additive white Gaussian noise channel (AWGN). 
Established on the bit error rate presentation to the transmission ability, the DWT constructed multicarrier scheme was establish to be higher to the predictable OFDM scheme.


Contrast Enhancement Using Dominant Brightness Level Analysis and Adaptive Intensity Transformation for Remote Sensing Images
This letter presents a novel contrast enhancement approach based on dominant brightness level analysis and adaptive intensity transformation for remote sensing images. The proposed algorithm computes brightness-adaptive intensity transfer functions using the low-frequency luminance component in the wavelet domain and transforms intensity values according to the transfer function. 
More specifically, we first perform discrete wavelet transform (DWT) on the input images and then decompose the LL subband into low-, middle-, and high-intensity layers using the log-average luminance. Intensity transfer functions are adaptively estimated by using the knee transfer function and the gamma adjustment function based on the dominant brightness level of each layer. 
After the intensity transformation, the resulting enhanced image is obtained by using the inverse DWT. Although various histogram equalization approaches have been proposed in the literature, they tend to degrade the overall image quality by exhibiting saturation artifacts in both low- and high-intensity regions. 
The proposed algorithm overcomes this problem using the adaptive intensity transfer function. The experimental results show that the proposed algorithm enhances the overall contrast and visibility of local details better than existing techniques. 
The proposed method can effectively enhance any low-contrast images acquired by a satellite camera and is also suitable for other various imaging devices such as consumer digital cameras, photorealistic 3-D reconstruction systems, and computational cameras. 


Design and implementation of an automatic traffic sign recognition system on TI Processor
This paper discusses the design and processor implementation of a system that detects and recognizes traffic signs present in an image. Morphological operators, segmentation and contour detection are used for isolating the Regions of Interest (ROIs) from the input image, while five methods - Hu moment matching, histogram based matching, Histogram of Gradients based matching, Euclidean distance based matching and template matching are used for recognizing the traffic sign in the ROI. 
A classification system based on the shape of the sign is adopted. The performance of the various recognition methods is evaluated by comparing the number of clock cycles used to run the algorithm on the Texas Instruments TMS320C6748 processor. 
The use of multiple methods for recognizing the traffic signs allows for customization based on the performance of the methods for different datasets. The experiments show that the developed system is robust and well-suited for real-time applications and achieved recognition and classification accuracies of upto 90%.


Digital watermarking using DWT and DES
The digital data are transmitted using the Internet. So digital data must be secure, copyright protected, and authenticated at the same time. This paper proposes an algorithm to protect digital data by embedding watermark that is encrypted by DES algorithm. Two level discrete wavelet transformation (DWT) is applied to the original image. This ensure robustness of the proposed scheme. 
DES encryption to the watermark with a key and iterating operations ensure security of the watermark information. Encryption and decryption key is same for both the process. If we want to extract the watermark image, we must obtain the secret key. The experimental result shows that the watermark is robust against various attacks.


Digital Watermarking with copyright authentication for image communication
The advancing world of digital multimedia communication is faces problems related to security and authenticity of digital data. In the context of multimedia communication, digital images and videos have numerous applications in entertainment world like TV channel broadcasting. 
Digital Watermarking algorithms used to protect the copyright of digital images and to verify multimedia data security. Most watermarking algorithms transform the host image and embedding of the watermark information by robust way. Uncompressed digital images need a lot storage capacity and bandwidth so efficient image transmission need image compression. 
The solution is becoming more complex with the growth of data. We propose Digital Watermarking by proposed transform Algorithm based on DCT-DWT watermarking. By this method we can do secure image transmission.


Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain
Signal processing in the encrypted domain is a new technology with the goal of protecting valuable signals from insecure signal processing. In this paper, we propose a method for implementing discrete wavelet transform (DWT) and multiresolution analysis (MRA) in homomorphic encrypted domain. 
We first suggest a framework for performing DWT and inverse DWT (IDWT) in the encrypted domain, then conduct an analysis of data expansion and quantization errors under the framework. To solve the problem of data expansion, which may be very important in practical applications, we present a method for reducing data expansion in the case that both DWT and IDWT are performed. 
With the proposed method, multilevel DWT/IDWT can be performed with less data expansion in homomorphic encrypted domain. We propose a new signal processing procedure, where the multiplicative inverse method is employed as the last step to limit the data expansion. 
Taking a 2-D Haar wavelet transform as an example, we conduct a few experiments to demonstrate the advantages of our method in secure image processing. We also provide computational complexity analyses and comparisons. To the best of our knowledge, there has been no report on the implementation of DWT and MRA in the encrypted domain.


Dual Transform Based Steganography Using Wavelet Families and Statistical Methods
Steganography is the discipline of exchanging top secret information by embedding it into a multimedia carrier. The ultimate aim, here is to hide the very existence of the embedded information within seemingly innocuous carriers. 
The proposed method extracts either Discrete Wavelet Transform (DWT) or Integer Wavelet Transform (IWT) coefficients of both cover image and secret image. After that two extracted coefficient values are embedded by fusion processing technique. Then the stego image is obtained by applying various combinations of DWT and IWT on both images. 
In this method, we concentrated for perfecting the visual effect of the stego image and robustness against the various attacks by using different wavelet families. Finally performance evaluation is done on dual transform steganography using wavelet families and statistical methods. In our method achieved acceptable imperceptibility and certain robustness.


Foggy Image Enhancement Using Wavelet Decomposition, Quadratic Thresholding and Auto-Adaptive LUM Filter
An image captured in a bad weather suffers from poor contrast. As one of the most common weather conditions, fog whitens the scenery that is the captured image and decreases the atmospheric visibility which leads to the decline of image contrast, gained by optical equipment and produces fuzzy look to the images. 
All the problems mentioned above might bring great difficulty to the image information extraction, outdoor image monitoring, automatic navigation, target identification, tracking and etc,.. Therefore, it is necessary that image captured in a bad weather or the foggy image is enhanced. 
In this paper, a new method for foggy image enhancement has been proposed, that integrates multilevel wavelet decomposition, the auto-adapted LUM filter, quadratic thresholding function and so on. 
Firstly, the multilevel wavelet decomposition is done to the image secondly low-frequency and high-frequency components of the image is obtained and finally the auto-adapted LUM filter is applied to low-frequency component. This new shrinkage function based on wavelet packet approximations turn out to be more flexible than the soft and hard-thresholding function and eventually carrying on wavelet restructuring to the processed components.


General Framework to Histogram-Shifting-Based Reversible Data Hiding
Histogram shifting (HS) is a useful technique of reversible data hiding (RDH). With HS-based RDH, high capacity and low distortion can be achieved efficiently. In this paper, we revisit the HS technique and present a general framework to construct HS-based RDH. 
By the proposed framework, one can get a RDH algorithm by simply designing the so-called shifting and embedding functions. Moreover, by taking specific shifting and embedding functions, we show that several RDH algorithms reported in the literature are special cases of this general construction. 
In addition, two novel and efficient RDH algorithms are also introduced to further demonstrate the universality and applicability of our framework. It is expected that more efficient RDH algorithms can be devised according to the proposed framework by carefully designing the shifting and embedding functions.


Hardware Implementation of a Digital Watermarking System for Video Authentication
This paper presents a hardware implementation of a digital watermarking system that can insert invisible, semifragile watermark information into compressed video streams in real time. The watermark embedding is processed in the discrete cosine transform domain. 
To achieve high performance, the proposed system architecture employs pipeline structure and uses parallelism. Hardware implementation using field programmable gate array has been done, and an experiment was carried out using a custom versatile breadboard for overall performance evaluation. 
Experimental results show that a hardware-based video authentication system using this watermarking technique features minimum video quality degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping, and segment removal on video sequences. 
Furthermore, the proposed hardware-based watermarking system features low power consumption, low cost implementation, high processing speed, and reliability.


Image authentication and restoration by multiple watermarking techniques with advance encryption standard in digital photography
In the past few years, semi-fragile watermarking techniques have become increasingly important to secure and verify the multimedia content and also to localize the tampered areas, while tolerating some non-malicious manipulations or attacks. In digital photography, watermarking schemes are very important for copyright protection purposes. 
In this paper, a multimedia authentication and restoration scheme is proposed with the security of AES-128 ciphered watermarking and correlated watermarking. An encrypted or ciphered image embedding is done by modified version of Closest Point Transform (CPT) in a digital photograph. 
We performed several security attacks e.g. noise attack, compression attack, and cropping attack on multiple watermarked photographs and evaluated the proposed watermarking technique to examine the system robustness. Image Authentication is done by locating the tempered areas and restoration is performed by correlated watermark on the tempered region of watermarked photograph. 
The PSNR values are checked to evaluate the proposed watermarking technique. The results of PSNR, MSE, and SSIM show that the imperceptibility of our scheme is high compared to existing methods.


Image steganography in DWT domain using double-stegging with RSA encryption
The need for preserving secrecy of sensitive data has been ever-increasing with the new developments in digital communication. In this paper, we present an advanced method for embedding encrypted secret data in grayscale images to provide high level security of data for communication over unsecured channels. 
The proposed system combines the features of Cryptography and Steganography. Cryptography involves converting the secret message into a non-recognizable cipher. Steganography is then applied using Double-stegging to embed this encrypted data into a cover media and hides its existence.


Implementation and performance analysis of DCT-DWT-SVD based watermarking algorithms for color images
Digital image watermarking is one such technology that has been developed to protect digital content (text, images, audio, and video) from illegal manipulations. 
In this paper we proposed implementation and performance analysis of two different watermarking schemes based on DCT-DWT-SVD. Both are non blind techniques. 
One is based on SVD of DC coefficients using second level DWT decomposition and other is consider SVD of all DCT values of second level DWT composition of cover image. To check effectiveness of both techniques for Imperceptibility and robustness PSNR and NCC parameters are used. 


Intensity Range Based Background Subtraction for Effective Object Detection
In this letter, we propose an intensity range based object detection scheme for videos with fixed background and static cameras. The scheme suggests two different algorithms; the first one models the background from initial few frames and the second algorithm extracts the objects based on local thresholding. 
The strength of the scheme lies in its simplicity and the fact that, it defines an intensity range for each pixel location in the background to accommodate illumination variation as well as motion in the background. 
The efficacy of the scheme is shown through comparative analysis with competitive methods. Both visual as well as quantitative measures show an improved performance and the scheme has a strong potential for applications in real time surveillance.


Irregular Moving Object Detecting and Tracking Based on Color in Real-time System
This paper describes an efficient approach for irregular moving object detecting and tracking in real-time system based on color and shape information of the target object from realistic environment. 
Firstly, the data is gotten from a real-time camera system at a stable frame rate. And then, each frame is processed by using proposed method to detect and track the target object immediately in consecutive frames. 
Finally, the target position based modifying controlling signal is used to control pan-tilt-zoom camera (PTZ camera) in order to automatically follow the target object. Our experiment results were obtained by using pan-tilt-zoom camera Sony EVI D70 under variety environments in real-time and our algorithm is verified that it can be implemented effectively and accurately at high frame speed, even 29.97 fps. 


Least Significant Bit Matching Stegoanalysis Based on Feature Analysis
Steganography is a science of hiding messages into multimedia documents. In steganography, there is a technique in which the least significant bit is modified to hide the secret message, known as the least significant bit (LSB) steganography. 
Several steganalyzers are developed to detect least significant bit (LSB) matching steganography. Least significant bit matching images are still not well detected, especially, at low embedding rate. 
In this paper, we have improved the least significant bit steganalyzers by analyzing and manipulating the features of some existing least significant bit matching steganalysis techniques. A comprehensive set of experiments is carried out to justify proposed method's applicability and evaluate its performance against the existing least significant bit matching steganalysis techniques. 


MIMO-OFDM Transceivers With Dual-Polarized Division Multiplexing and Diversity for Multimedia Broadcasting Services
This brief paper presents multi-input multi-output orthogonal frequency division multiplexing (MIMO-OFDM) systems with dual-polarized division multiplexing (PDM) and diversity for multimedia broadcasting services. In particular, the polarized diversity is realized by transmitting two independent and distributed space-frequency coded signals through two sets of dual-polarized transmit antennas. 
In the corresponding polarized receptions, MIMO zero-forcing (ZF) detection and ZF detection combined with a group-wise or a symbol-wise successive cancelation (SIC) are used to minimize a depolarization effect caused by a cross-polarization discrimination (XPD). Furthermore, we analyze the output signal-to-interference-plus-noise ratio (SINR) of such MIMO detections in terms of the XPD effect. 
It is shown that the output SINR of MIMO ZF detection increases as the absolute XPD value increases. It is also shown that the output SINR of ZF-SIC detection converges to that of ZF detection as the absolute XPD value increases. 
Finally, we compare the performances of uni-polarized and dual-polarized MIMO-OFDM systems over a multipath Rician channel with XPD. From simulation results, we conclude that as the absolute XPD value increases, the polarized MIMO-OFDM systems provide a lower symbol error rate than uni-polarized MIMO-OFDM systems. 


Novel Techniques to reduce PAPR in OFDM Systems Using Threshold SLM
Orthogonal Frequency Division Multiplexing (OFDM) is proven technology in modern wireless communication because of its high data rate, more immunity to delay spread. In this paper, we proposed probabilistic threshold Selective Mapping Technique which has low PAPR. The simulation result shows that modified technique has better PAPR reduction performance. 


Novel Windowing Scheme for Cognitive OFDM Systems
In this paper a new shaping window is designed to force the side-lobe of OFDM transmission to decay faster than conventional raised-cosine windowing. The proposed window is a soft-window based on the characteristics of functions with vestigial symmetry, which are common in digital data transmission. 
By using the vestigial symmetry and enforcing several null derivatives at the extremes of the window, it is possible to control the fast out-of-band decay. 
Results show that by using a lower roll-off factor (10%) the proposed window can achieve the same performance of raised-cosine (100 %) with around 90% overhead savings, making it of interest for OFDM cognitive radio.


Optimal 16-Ary APSK Encoded Coherent Optical OFDM for Long-Haul Transmission
In this letter, an optimal 4+12 amplitude and phase shift keying (APSK) modulated coherent optical orthogonal frequency-division-multiplexing (CO-OFDM) system is proposed (the numbers 4 and 12 represent the constellation points located in the inner ring and the outer ring, respectively). 
Although the 4+12APSK modulation format has smaller average Euclidean distance than 16 quadrature amplitude modulation (QAM), the 4+12APSK modulated CO-OFDM system has the best transmission performance, with increased tolerance towards both amplified spontaneous emission noise and fiber nonlinearities compared with 16QAM and 8+8APSK modulated OFDM systems. 
The maximum reach at Q factor=8.2 dB (when bit-error rate (BER) equals 5 × 10-3) is evaluated to assess the system performance based on a single-channel and five-channel wavelength division multiplexing (WDM) CO-OFDM system, and illustrates that the transmission performance of 4+12APSK modulated OFDM outperforms 8+8APSK modulated OFDM and 16QAM modulated OFDM by approximately 10.5%, and in the WDM system, it surpasses 8+8APSK modulated OFDM by approximately 5.6% and 16QAM modulated OFDM by 18.75%.


Performance Analysis of OFDM Systems with Selected Mapping in the Presence of Nonlinearity
In the presence of nonlinearity, we analyze the impact of the selected mapping (SLM) technique on bit-error-rate (BER) performance of orthogonal frequency division multiplexing (OFDM) systems in an additive white Gaussian noise channel. 
The peak-to-average-ratio (PAR) reduction gain of SLM can be increased by improving the PAR statistics at the cost of complexity in the OFDM transmitter, thereby helping to decrease the required power amplifier (PA) output backoff (OBO). 
However, since the PAR statistics focus only on the statistical distribution of the highest peak in an OFDM symbol, the statistics cannot be used to quantify BER performance degradation in the presence of nonlinearity such as that caused by a PA or digital-to-analog converter (DAC). We first derive a closed-form expression for the envelope power distribution in an OFDM system with SLM.
Then, using this derived envelope power distribution, we investigate the BER performance and the total degradation (TD) of OFDM systems with SLM under the existence of nonlinearity. We discuss peak backoff (PBO) and the clipping ratio, which determine the operating point of the PA and dynamic range of the DAC, respectively. 
Lastly, we consider the total degradation (TD), which indicates the tradeoff between the OBO and the E_b/N_o penalty due to nonlinearity, and numerically compute the PBO and clipping ratio that minimize the TD. The TD-minimizing PBO and clipping ratio are given as functions of the number of candidate signals in SLM.


Performance analysis of SLM for PAPR reduction of OFDM signal in Marine Channel
Orthogonal frequency division multiplexing (OFDM) modulation using orthogonal subcarriers reduces the delay spread by increasing robustness to multipath fading and can use overlapped bandwidth due to orthogonality on frequency domain. 
The main drawback of Orthogonal Frequency Division Multiplexing (OFDM) systems is the high peak-to average power ratio (PAPR), which significantly reduces the efficiency of the transmit high power amplifier (HPA). 
Several methods have been proposed in the literature to reduce the peak power of OFDM signals and substantial gains were reported. In SLM technique of PAPR reduction, side information needs to be transmitted for demodulation while degrading transmission efficiency. Though many studies have been carried out to analyze the performance of various PAPR reduction methods for land, the studies for sea environment is hardly addressed in literature. 
In this paper, we have analyzed the effectiveness of SLM technique utilizing cyclic shifting of pilots for Marine Channel. 


Practical Camera Calibration From Moving Objects for Traffic Scene Surveillance
We address the problem of camera calibration for traffic scene surveillance, which supplies a connection between 2-D image features and 3-D measurement. It is helpful to deal with appearance distortion related to view angles, establish multiview correspondences, and make use of 3-D object models as prior information to enhance surveillance performance. A convenient and practical camera calibration method is proposed in this paper. 
With the camera height H measured as the only user input, we can recover both intrinsic and extrinsic parameters of the camera based on redundant information supplied by moving objects in monocular videos. All cases of traffic scene layouts are considered and corresponding solutions are given to make our method applicable to almost all kinds of traffic scenes in reality. 
Numerous experiments are conducted in different scenes, and experimental results demonstrate the accuracy and practicability of our approach. It is shown that our approach can be effectively adopted in all kinds of traffic scene surveillance applications. 


Real Time Edge Detected Advanced Image Acquisition System using RGB Analysis
In modern era the real time edge detection of moving elements in image sequences is the most important step in many image & video acquisition systems including automated visual surveillance. In this paper, we present an advanced framework for detecting some very important issues, like people identification and people flow count in restricted organizations for security measures. 
The objectives is to constant monitor activities at restricted regions for detecting unwanted congestions and predict the people flow which assists in regulating the crowd density at the target place. 
This unique approach help us as the system can sense the frame of target object, detect instantly the edges of the target, automatically process the captured footage and provides the filtered version of the target image/video. In addition with, our proposed system can also track the motion of the target object (people). Also color histograms (RGB) help us to make prompt decisions while capturing the total range of existing digital image/video. 
In this paper the proposed system with such modern features combined is designed using MAT Lab/SIMULINK V.7.10.0 and simulated. The related experimental results are shown and evaluated successfully.


Retinal Blood Vessel Segmentation using an Extreme Learning Machine Approach
Diabetic retinopathy is a vascular disorder caused by changes in the blood vessels of the retina. The proposed work uses an Extreme Learning Machine (ELM) approach for blood vessel detection in digital retinal images. 
This approach is based on pixel classification using a 7-D feature vector obtained from preprocessed retinal images and given as input to an ELM. Classification results categorizes each pixel into two classes namely vessel and non-vessel. Finally, post processing is done to fill pixel gaps in detected blood vessels and removes falsely-detected isolated vessel pixels. 
The proposed technique was assessed on the publicly available DRIVE and STARE datasets. The approach proves vessel detection is accurate for both datasets.


Robust Watermarking of AES Encrypted Images for DRM Systems
Digital image capturing, processing and distribution has showed a remarkable growth over recent years. This media content is sometimes distributed in encrypted format and watermarking of these media items for proof of ownership, media authentication needs to be carried out in encrypted domain to improve image security. 
Therefore it is sometimes necessary to embed watermark in encrypted media items for ownership declaration or copyright management purposes. DRM system is one such example where there is a challenge to watermark these encrypted data as the encryption would have randomized the incoming data. 
In this paper, a block cipher called AES-128 bit key encryption algorithm and DCT combined with DWT based watermarking algorithm to watermark the encrypted image were proposed which increases robustness of the watermark. These method embeds the binary watermark in encrypted image and decryption is done after extraction of watermark.


Satellite Image Enhancement Using Discrete Wavelet Transform and Threshold Decomposition Driven Morphological Filter
Satellite color images are being used in many fields of research. One of the major issues of these types of color images are their poor perception. In this letter a new method to enhance the satellite image which using the concept of wavelets and threshold decomposition. 
The proposed enhancement technique uses DWT to decomposed input image into different sub bands. Threshold decomposition is a powerful theoretical tool, which is used in nonlinear image analysis. 
Detecting the positions of the edges through threshold decomposition and these edges are sharpened by using morphological filters. This method will give better qualitative and quantitative results.


Satellite Image Resolution Enhancement Using Dual-Tree Complex Wavelet Transform and Nonlocal Means
Resolution enhancement (RE) schemes (which are not based on wavelets) suffer from the drawback of losing high-frequency contents (which results in blurring). The discrete-wavelet-transform-based (DWT) RE scheme generates artifacts (due to a DWT shift-variant property). 
A wavelet-domain approach based on dual-tree complex wavelet transform (DT-CWT) and nonlocal means (NLM) is proposed for RE of the satellite images. A satellite input image is decomposed by DT-CWT (which is nearly shift invariant) to obtain high-frequency subbands. 
The high-frequency subbands and the low-resolution (LR) input image are interpolated using the Lanczos interpolator. The high-frequency subbands are passed through an NLM filter to cater for the artifacts generated by DT-CWT (despite of its nearly shift invariance). 
The filtered high-frequency subbands and the LR input image are combined using inverse DT-CWT to obtain a resolution-enhanced image. Objective and subjective analyses reveal superiority of the proposed technique over the conventional and state-of-the-art RE techniques. 


Segmentation of Tissues in MR Images using Modified Spatial Fuzzy C Means Algorithm
MRI brain images are widely used in medical applications for research, diagnosis, treatment, surgical planning and image guided surgeries. These MR brain images are often corrupted with Intensity Inhomogeneity artifact cause unwanted intensity variation due to non- uniformity in RF coils and Rician noise, the dominant noise in MRI due to thermal vibrations of electrons and ions and movement of objects during acquisition which may affect the performance of image processing techniques used for brain image analysis. 
Due to this type of artifact and noises, sometimes one type of normal tissue in MRI may be misclassified as other type of normal tissue and it leads to error during diagnosis. In this work, a method is proposed which automatically segments normal tissues such as White Matter, Gray Matter and Cerebrospinal Fluid from MR images with Rician noise and Intensity Inhomogeneity artifact. 
The proposed method consists of preprocessing using wrapping based curvelet transform to remove noise and Modified Spatial Fuzzy C Means segments normal tissues by considering spatial information because neighboring pixels are highly correlated and also construct initial membership matrix using initial cluster center by incorporating spatial neighborhood information to improve strength of clustering. 
This combination reduces Intensity Inhomogeneity artifact by providing higher segmentation accuracy. In this proposed work, the accuracy, sensitivity and specificity are improved with better segmentation over other previous methods.


Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique
The field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous work we proposed separable and reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique as solution. 
In this sender encrypt data and image separately using AES algorithm, hides encrypted data in encrypted image using LSB technique, system auto generate the all 3 respective keys. 
Sender sends the file through existing mail system. Receiver can perform operation as per respective keys like if he has only data hiding and image decryption key then he can only get the image in original form or if he have data hiding and data decryption key then he can get original data, system also provides protection for auto generated keys and system auto generate mail if user fail to perform any operation. 


Shadow Removal for Background Subtraction using Illumination Invariant Measures
In this paper, we propose methods for shadow removal in static background environment. Accurate background subtraction is essential to detect and track various objects. Shadow and objects similar in color are major problems in background subtraction and tracking. 
In order to address these problems, we propose shadow removal method for background subtraction using illumination invariant measures. First, we computed a reference background image and the illumination invariant measures were applied to the reference background image and an input image. 
We compared the proposed method with some existing background subtraction methods. The experimental results showed that the proposed method produced more accurate results.


Spectrum-Efficient Coherent Optical OFDM for Transport Networks
Orthogonal frequency division multiplexing (OFDM) is a promising technology for the next-generation optical transmission systems beyond 100 Gb/s. To further improve the spectral efficiency and system reliability, we propose a flexible coherent zero padding OFDM (CO-ZP-OFDM) scheme with signaling-embedded preamble and polarization-time-frequency (PTF) coded pilots for high-speed optical transport networks. Our judicious design embeds signaling in the specially designed preamble whose Delta-like correlation function helps to simultaneously achieve very accurate timing and frequency synchronization. 
Unlike the periodically inserted training symbols, the PTF-coded pilots are properly distributed within the time-frequency grid of the ZP-OFDM payload symbols and used to realize low-complexity multiple-input multiple-output (MIMO) channel estimation at high accuracy. 
Compared with the conventional optical OFDM systems, CO-ZP-OFDM increases payload by about 6.68%, and the low-density parity-check (LDPC) coded bit error rate only suffers from no more than 0.3 dB compared with the back-to-back case even when the channel dispersion impairments are severe. 


Study and Analysis of PCA, DCT & DWT based Image Fusion Techniques
Image Fusion is a process of combining the relevant information from a set of images, into a single image, wherein the resultant fused image will be more informative and complete than any of the input images. 
This paper discusses the Formulation, Process Flow Diagrams and algorithms of PCA (principal Component Analysis), DCT (Discrete Cosine Transform) and DWT (Discrete Wavelet Transform) based image fusion techniques. 
The results are also presented in table & picture format for comparative analysis of above techniques. The PCA & DCT are conventional fusion techniques with many drawbacks, whereas DWT based techniques are more favorable as they provides better results for image fusion. In this paper, two algorithms based on DWT are proposed, these are, pixel averaging & maximum pixel replacement approach.


Texture classification using color local texture features
This Paper proposes a new approach to extract the features of a color texture image for the purpose of texture classification. Four feature sets are involved. Dominant Neighbourhood Structure (DNS) is the new feature set that has been used for color texture image classification. 
In this feature a global map is generated which represents measured intensity similarity between a given image pixel and its surrounding neighbours within a certain window. Addition to the above generated feature set, features obtained from DWT are added together with DNS to obtain an efficient texture classification. Also the proposed feature sets are compared with that of Gabor wavelet, LBP and DWT. 
The texture classification process is carried out with the robust SVM classifier. The experimental results on the CUReT database shows that the proposed method is an efficient method whose classification rate is higher when compared with the other methods.


Track Creation and Deletion Framework for Long-Term Online Multi face Tracking
In many visual multi-object tracking applications, the question when to add or remove a target is not trivial due to, for example, erroneous outputs of object detectors or observation models that cannot describe the full variability of the objects to track. In this paper, we present a real-time, online multi-face tracking algorithm that effectively deals with missing or uncertain detections in a principled way. 
The tracking is formulated in a multi-object state-space Bayesian filtering framework solved with Markov Chain Monte Carlo. Within this framework, an explicit probabilistic filtering step relying on head detections, likelihood models, and long term observations as well as object track characteristics has been designed to take the decision on when to add or remove a target from the tracker. 
The proposed method applied on three challenging datasets of more than 9 hours shows a significant performance increase compared to a traditional approach relying on head detection and likelihood models only. 


Wavelet Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems
With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as Point-of-Care (PoC) applications in hospitals around the world. 
Therefore, huge amount of ECG signal collected by Body Sensor Networks (BSNs) from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level etc. and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data is being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. 
In this paper, a wavelet based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest. 
To evaluate the effectiveness of the proposed technique on the ECG signal, two distortion measurement metrics have been used: the Percentage Residual Difference (PRD) and the Wavelet Weighted PRD (WWPRD). It is found that the proposed technique provides high security protection for patients data with low (less than 1% ) distortion and ECG data remains diagnosable after watermarking (i.e. hiding patient confidential data) and as well as after watermarks (i.e. hidden data) are removed from the watermarked data.





FOR MORE ABSTRACTS, IEEE BASE PAPER / REFERENCE PAPERS AND NON IEEE PROJECT ABSTRACTS

CONTACT US
No.109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 600 034
Near Ganpat Hotel, Above IOB, Next to ICICI Bank, Opp to Cakes'n'Bakes
044-2823 5816, 98411 93224, 89393 63501
ncctchennai@gmail.com, ncctprojects@gmail.com 


EMBEDDED SYSTEM PROJECTS IN
Embedded Systems using Microcontrollers, VLSI, DSP, Matlab, Power Electronics, Power Systems, Electrical
For Embedded Projects - 044-45000083, 7418497098 
ncctchennai@gmail.com, www.ncct.in


Project Support Services
Complete Guidance | 100% Result for all Projects | On time Completion | Excellent Support | Project Completion Experience Certificate | Free Placements Services | Multi Platform Training | Real Time Experience


TO GET ABSTRACTS / PDF Base Paper / Review PPT / Other Details
Mail your requirements / SMS your requirements / Call and get the same / Directly visit our Office


WANT TO RECEIVE FREE PROJECT DVD...
Want to Receive FREE Projects Titles, List / Abstracts  / IEEE Base Papers DVD… Walk in to our Office and Collect the same Or

Send your College ID scan copy, Your Mobile No & Complete Postal Address, Mentioning you are interested to Receive DVD through Courier at Free of Cost


Own Projects
Own Projects ! or New IEEE Paper… Any Projects…
Mail your Requirements to us and Get is Done with us… or Call us / Email us / SMS us or Visit us Directly

We will do any Projects…




Matlab Project Titles, Matlab Project Abstracts, Matlab IEEE Project Abstracts, Matlab Projects abstracts for CSE IT MCA, Download Matlab Titles, Download Matlab Project Abstracts, Download IEEE Matlab Abstracts