full catalogue 2005 09

Upload: alok-bansla

Post on 01-Jun-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Full Catalogue 2005 09

    1/64

     

    1

    Catalogue

    of  

    B.Tech. Project Reports

    Batch - 2005-09

     Abstracts

    Resource Centre

    DA-IICTGandhinagar - 382007 

  • 8/8/2019 Full Catalogue 2005 09

    2/64

      i

    Introduction

    The Resource Centre team is happy to bring out this catalogue listing B. Tech. Projects,

    submitted by the 2005-2009 batch students to the Institute. This document covers in all 172

    projects submitted by 2005-09 batch students and are listed in alphabetical order under eachyear by student’s surname. Each entry of the project provides the bibliographical details, such

    as author (with ID number), title, page numbers, year of submission, supervisor name, call

    number, accession number, keywords and abstracts. At the end, author and supervisor

    indexes have been provided to enable the user to locate a specific entry in this catalogue.

    Hope you will find this document useful. We would be happy to have your comments and

    suggestions, if any, to improve this catalogue further.

    Updated on: 25/03/2010 Resource Centre Team

  • 8/8/2019 Full Catalogue 2005 09

    3/64

      i

    Contents

    Batch - 2005-2009

    1.  Ultra Wide Band Transmission and Receiver Design 

    By Abhinav Vijay and Kunal Malik

    1

    2.  1

    3.  Parking Lot Management System 

    By Ambuj Agarwal

    1

    4.  Intelligent Traffic Management - Segregation of Vehicles using Video Images

    By Himanshu Agarwal

    2

    5.  On Uniquely Diagnosable Fault Sets in Diagnosable Systems

    By Ritu Agarwal

    2

    6.  -n Junction Solar Cell Simulator - Graphical Simulation and Physics of Solar Cell

    By Vineet Aggarwal

    2

    7.  Context Aware Semantic Service Discovery

    By Ankit Agrawal

    2

    8.  Design of Stable Adaptive IIR Notch Filter Using all-pass Lattice Structure

    By Manish Agrawal and Ankit Kumar Jain

    3

    9.  Detection of Digital Image Manipulation

    By Rohin Agrawal

    3

    10.  Design and Development of Mobile Intelligent Tutoring Systems

    By Anuj Kumar

    3

    11.  Health-checking and verification of the DDR3 Subsystem and Survey of clock Domain

    Crossing

    By V. V.Aravindh

    3

    12. 

    Hybrid Approach to Digital Watermarking Using Independent Component Analysis and Spread

    Spectrum

    By Arjun Singh

    4

    13.  Experimental Evaluation of Dynamic Data Structure for Point Location Problem

    By Sumit Bagga

    4

     Air for Human Simulator (AFHS) : Graphical Simulation and Physical Study of Inhaled Air 

    By Aditya Prakash and Sidharth Kumar

  • 8/8/2019 Full Catalogue 2005 09

    4/64

      ii

    14.  Performance Analysis Tools for ARM

    By Sumit Bagla

    4

    15.  BREW MP Eclipse Plugin

    By Ankit Baphna

    4

    16.  Broadband Beamforming

    By Puneet Baser and Anik Mundra

    5

    17.  Contour Extraction of moving object in a still camera video

    By Sangam Batra

    5

    18.   Aperture Coupled Microstrip Antenna

    By Rohit Bhagya and Pawan Gupta

    5

    19.  Polarimetric SAR Data Processing

    By P.V. Vijay Bhargava

    5

    20.  Parallel Query Optimization for Join Framework of Pig Latin

    By Nitesh Bhatia

    6

    21.  Predict Neural Networks output more accurately using OpenMP Application Program Interface

    (API)

    By Avinash Bikualla

    6

    22.  PC-Based Tool for Comprehensive Test Application

    By Srikanth Reddy Bontha

    6

    23.  No-Three-in-Line Problem

    By Ravi Teja Boppudi

    6

    24.  Optical Character Recognition

    By P. Satish Chandra

    7

    25.   Acyclic Orientation of Undirected Graphs to Maximize Reachability

    By Sakshi Chandra and Somya Agarwal

    7

    26. 

    Bluetooth Security Using Identity Based EncryptionBy Vikrant Chaplot

    7

    27.   Algorithms for finding a Minimal Dominating Set in a Graph

    By Kalyan Cheedi

    7

    28.  OLAP Technology for Business Intelligence Analytics System in Retail Enterprises

    By B. K Nagarjuna Chitneni

    8

  • 8/8/2019 Full Catalogue 2005 09

    5/64

      iii

    29.  Design Pattern Recognition Using DSM

    By Aditya Chittor

    8

    30.   Activity and Budget Monitoring System for ATMA

    By Kishan Singh Chouhan

    8

    31.  Designing CIL Connector To Scyther

    By Sidhartha Chauhan

    8

    32.  Development and optimization of CMOS Structured ASIC libraries

    By B. Aneesha Chowdhary

    9

    33.  Hafnium Oxide Gate Dielectrics for Microelectronics Applications

    By Pallavi Daggumati

    9

    34.  Lifestyle Modificator

    By Abhishek Daiya

    9

    35.  Robot Motion Planning

    By Udaya Bhaskar Dantuluri

    9

    36.   A Novel Design for a Current Feedback Amplifier

    By Apurva Dargar and Ankit Mundra

    10

    37.  Improvised filter designs for Performance Enhancement of Depth Estimation using Single

    Monocular Images

    By Das, Aniruddha and Ramnani, Vikas

    10

    38.  Mobilizing Community Health Workers to Improve Maternal Health in India

    By Prabhu Dutta Das

    10

    39.   Vehicle make and model recognition

    By Akash Dayal

    11

    40.   A Case Study in System Dynamics

    By Rounak Dholakia and Krishna Abhinav

    11

    41. 

    High Performance Implementation of Pulsed OFDM For Ultrawideband Communications

    By Hima Kireeti Srikanth Dhulipala

    11

    42.  Semantic Web for Agriculture Production (SWAP)

    By Ojas Dubey and Vishal Lalwani  

    11

    43.  Depth estimation in a Low Depth of Field image 12

  • 8/8/2019 Full Catalogue 2005 09

    6/64

      iv

    By Apuroop Gadde

    44.   A Randomized Linear Time Algorithm to find Minimum Spanning Trees

    By Ramachandra Rao Gadde

    12

    45.  On-Line Fair Resource Allocation Scheme in OFDMA Systems Using Cooperative Game

     Theory

    By Rohan Gaddh and Khyati Jain

    12

    46.  Development of GSM Protocol through LPC2106 Microcontroller

    By Amit Garg and Puneet Jindal

    12

    47.  Robust Design for M-Banking Client Application on Mobile using Design Patterns

    By Sagun Garg

    13

    48.  Semantic Search Engine

    By Nitin Gopi

    13

    49.  Developing Ontology for Indian Technical Institutes

    By Gowtham Srinivas P. and Reddy, D. Ravindra Kumar

    13

    50.  Portfolio Optimization

    By Abhas Goyal and Rubish Gupta

    13

    51.   An optimized LVQ algorithm for multi-interval discretization of continuous values

    By Ankush Goyal and Abhinesh Mishra

    14

    52. 

    Ontology Matching

    By Deep Goyal

    14

    53.  Public-Key Cryptography Using Paraunitary Matrices over Fields of Characteristic Two

    By Gourav Goyal

    14

    54.  Formal Analysis of Hierarchical Key Assignment Schemes

    By Aakar Gupta and Milan Saini

    14

    55.  Development of C Simulator for AWG Based Analog & digital Video Interface

    By Abhishek Gupta

    15

    56.  Extending cursor - A New Technique for Enhancing Target Acquisition

    By Amit Gupta

    15

    57.  Coreference Resolution Using Inductive Logic Programming

    By Anurag Gupta

    15

  • 8/8/2019 Full Catalogue 2005 09

    7/64

      v

    58.  File system for Real Time Applications with Continuous Media

    By Divyank Gupta

    15

    59.   Web Service Discovery and Composition

    By Rohit Gupta and Abhishek Somani

    16

    60.  Secure Data Transmission Protocol for Distributed Wireless Sensor Networks

    By Sachin Gupta

    16

    61.   A 0.7 Volt High Performance Three Stage OPAMP Using Forward Body Biased Technique

    By Shekhar Gupta

    16

    62.  Crop Estimation Model : Prediction and Simulation

    By Ravi Grandhi

    16

    63.   Algorithm for converting SQL into relational algebra

    By Ashok Kumar Iraveni

    17

    64.  Mash-Maker: An Integrated framework for developing next generation Mashups

    By Amit Jain and Sumit Pandey

    17

    65.   Virtual/Soft token Based Two-factor Authentication

    By Anurag Jain

    17

    66.  DDR2 SDRAM Model Verification Using Palladium and Axis

    By Anurag Jain

    18

    67. 

    Dynamic Time Warping Based Approach to Dialect Recognition in Indian English

    By Chaitanya Jain

    18

    68.  Porting Free RTOS on WildCense

    By Manish Jain

    18

    69.  Is the attack valid? A Tool for Detecting Erroneous Attacks Found by Scyther

    By Mohit Jain

    18

    70.  Service Mashups

    By Madan Lal Jat

    19

    71.   A Proof Technique for Greedy Algorithms

    By Anju Jha

    19

    72.  Face Detection and Recognition

    By Harsha Jhunjhunwala

    19

  • 8/8/2019 Full Catalogue 2005 09

    8/64

      vi

    73.  Disk Scheduling Algorithms for Continuous media file systems

    By Nitesh Jindal

    20

    74.  Enabling MultiPoint in Educational Tools

    By Apurva Joshi

    20

    75.   Automated Correction of Faulty Security Protocols

    By Prachi Joshi

    20

    76.  Multimedia Content Encryption

    By Prakash Josyula

    20

    77.  Question nswering in Bio Medical Text

    By Anshika Kalra

    21

    78.  Cross-layer Design for Multimedia streaming in Cluster Based Adaptive Two-hop Wireless

    Network

    By Poornachand Kalyampudi

    21

    79.  Performance Analysis of Approximate Nearest Neighbor Searching for k-d and BBD trees

    By T. Karteek

    21

    80.   Waste Monitoring System

    By Swapnil Khandelwal

    21

    81.   A Study on Kalman Filter and Estimation Techniques

    By Ravin Khanted

    22

    82.  Parallel and Dynamic Graph algorithms for Shortest Path Problem

    By Anil Kishore and Koneru, Tilak

    22

    83.  Scheduling in Wireless Fading Systems Using Cross layer Design Approach

    By Nishanth Koganti

    22

    84.  Creation of Test Framework and Testing of WCDMA-AS Air Interface software

    By Sravani Ratna Konkimalla

    22

    85. 

    Channel Estimation using Pilots in OFDM SystemsBy Sreekanth Kotapati

    22

    86.  Non-homogenous AR (auto-regressive) Model Based prior for Multi-resolution Fusion

    By R.V.S.Krishna

    23

    87.   Vertex coloring Problem and maximal Independent Set Construction

    By V. Krishna Teja

    23

  • 8/8/2019 Full Catalogue 2005 09

    9/64

      vii

    88.  Evolutionary Algorithms for MultiObjective Optimization

    By Kashyap Kuchipudi

    23

    89.  FPGA Implementation of JPEG2000 Arithmetic Encoder

    By Lakkaraju Ramesh

    23

    90.   A Connector between Scyther and SHRIMP

    By Lal, Siddhartha

    24

    91.  Formal Verification of Security Protocols using ALSP

    By Suvansh Lal

    24

    92.  System Dynamics of IT & BPO Company

    By Manmeet Singh and Vishav Vikram Kapoor

    24

    93.   ASIC Design

    By Divya Macharla

    24

    94.  Development of a Secure Steganographic Technique

    By Swetha Sri Madhavapeddi

    25

    95.  Distributed Vertex Colouring Algorithms based on Greedy Colouring

    By Ratnesh Malviya

    25

    96.  Invariant Texture Analysis

    By Sudha Praveen Maremanda

    25

    97.  Clozer - An Authoring Environment for Creating Interactive Classroom Learning Content

    By Akhil Mathur

    25

    98.  Ontology for UG program in CS/IT

    By Praveen Meel

    26

    99.  Low Power Motion Estimation Circuit Using Adiabatic Logic

    By Saransh Mehrotra

    26

    100.   Analyzing Multiple Regression and Neural Network in Modeling a Dynamic Pattern

    By Umang Merwana and Jitendra Kumar Pandey

    26

    101.  Implementation of Hidden Markov Model for Building a Speaker Dependent Isolated Word

    Recognizer

    By Mayank Mishra

    26

    102.   To Define Accurate Channel Capacity by Merging Electromagnetic and Information Theory 27

  • 8/8/2019 Full Catalogue 2005 09

    10/64

      viii

    By Ashish Mittal and Prashant Bajaj

    103.  Farmer Information System for ATMA

    By Ankit Modi

    27

    104.   Authentication of Digital Images

    By Siva Charan Muraharirao

    27

    105.  Probe Sequences in Hash Tables

    By Murthy, R. Satyanarayan

    27

    106.  Fragile Domain Watermarking Techniques

    By Pradeeep Nagireddy

    28

    107.  Implementation and Modification of Embedded Zerotree Wavelet Coder for Still Image

    compression

    By Rajendra Prasad Nalamati

    28

    108.  1V Rail-to-Rail 12-bit Pipelined ADC

    By Nallavelli, Ramya and Yenugula, Naveen

    28

    109.   Algorithm Evaluation for the weighted Vertex Cover Problem

    By Amit Nama and Saurabh Mittal

    28

    110.  Securing SSL/TLS against Man-in-the-middle Attack

    By Navkar Samdaria

    29

    111. 

     Visualization of OWL Ontology

    By Vasavi Kumar Nekkanti

    29

    112.   Wasteland Identification & Soil Property Analysis using GIS

    By Abhinav Nigam and Anuj Srivastava

    29

    113.  Developing Ontology For Music

    By Vikas Nunia and Anukool Tiwari

    29

    114.  Qualitative Analysis of C4.5 Decision Tree Induction Algorithm

    By Varun Rajendra Parimi

    30

    115.  Fault Identification In Diagnosable Systems

    By Nandini Patnaik

    30

    116.  Hardware Implementation of Full-Search Block Matching Algorithm

    By Satish Pitchikala

    30

  • 8/8/2019 Full Catalogue 2005 09

    11/64

      ix

    117.  Effect of Frequency Offset on OFDM

    By Praveen Kumar and Vinay Kumar Srivastava

    30

    118.  Low Noise Amplifier Design

    By Nikhil Prakash and Saurabh Garg

    31

    119.  Node Localization in Lunar Environment

    By N. S.Prithvi Raj Krishna

    31

    120.   Technique to Reduce Vector Generation Time and Resource Requirement

    By B.K.Priyanka

    31

    121.   A Novel MAC Layer Configuration Protocol for CR Based Multihop Wirless Networks

    By Autul Purohit and Ritika Pareek

    31

    122.  Implementation of Rational Wavelets and Filter Design for Speech Recognition

    By Raj Rishi Purohit,

    32

    123.  Enhancements to Repository Management

    By G. Ram and Saumya Mittal

    32

    124.  Miniaturized Microstrip Antenna and Microstrip Array Antenna at 1.4 GHz

    By Laveen Ramrakhiyani and Nirdesh Kumar

    32

    125.   A Kalman filter estimation approach for modeling Time Series data in Stock Market

    By Pankaj Kumar Rathi and Sparsh Verma

    32

    126. 

    Real Time Scheduling Using Least-Cost-Last Algorithm

    By G. Ravi Shankar

    33

    127.   Text Document Classification Using Finite Mixture Model

    By P. Vivek Reddy

    33

    128.   Analysis of Software Architecture using Dependency Manager

    By V. S. Goutham Reddy,

    33

    129.  Comparative Analysis of Klein’s and Modified Klein’s Algorithm

    By Ravi Kiran Rimmanapudi

    34

    130.  Fast Approach for Stereo Using Particle Swarm Optimization Technique

    By Rout, Lipsa Shrabani

    34

    131.  Settlement of Chharanagar

    By Mohit Kumar Rungta and Kapil Shahani

    34

  • 8/8/2019 Full Catalogue 2005 09

    12/64

      x

    132.  Experimental Study of Connected Dominating Sets for Mobile Ad-Hoc Networks

    By Rohit Kumar Sahoo and Gaurav Parikh

    34

    133.   A Tool for Automatically Generating Security Protocols

    By P. Sai Teja and Sawant Tandle

    34

    134.  Computational Geometry -Witness Set and Guard Set Problem

    By Sambu Shiva Sai Krishna Prasad

    35

    135.  Metrics on Protein Structure

    By P. Shanmukha Sampath

    35

    136.  Path Complexity of Programs

    By Shubham Saxena

    35

    137. 

    Improving Load-Transient Response of Capacitor less Low Drop out Voltage RegulatorBy Khaja Ahmad Shaik

    36

    138.  Secure Program Execution in Wireless Sensor Networks (WSN)

    By Amit Sharma

    36

    139.  Connected Dominating Set in Wireless Ad-hoc Network

    By Anshul Sharma and Manish Golcha

    36

    140.  Effects of Integrating Digital Visual Materials for Rural Education

    By Ashish Sharma

    36

    141.  Comparison of relative Performance of TEO and VTEO for Emotion Recognition

    By Gaurav Sharma

    37

    142.  Ultra Wideband Low-Noise Amplifier Design

    By Ruchi Sharma and Kapil Jain

    37

    143.  Preserving Edges In Regularized Constrained Least- Squares Image Restoration

    By Sudhanshu Sharma

    37

    144.  MIMO-OFDM Channel Equalization

    By Shashank Kumar and Varun Raj C.V

    38

    145.   Weaknesses and Improvements of E-Mail Protocols

    By Ajeet Singh Shekhawat

    38

    146.   Virtual Tour of the Institute (DA-IICT) Campus

    By Praveen Shekhar

    38

  • 8/8/2019 Full Catalogue 2005 09

    13/64

      xi

    147.  Face Recognition model using 2D PCA and LDA

    By Samata Shettigar

    38

    148.  On Acyclic Orientation of an Undirected Graph for Maximizing Reachability

    By Kirti Shrinkhala

    39

    149.  Framework for Providing QoS guarantees in Continuous Media Applications

    By Ankur Singhal

    39

    150.   Adaptive SVD update algorithms for Channel Estimation in MIMO Systems

    By Shruti Singhania

    39

    151.   VoIP Security using Dynamic Authentication and Identity-based Technique

    By Rahul Sinha and Swati Verma

    39

    152.  Centralized Printing System

    By P. V.Soumya

    40

    153.  Rapid Performance Benchmarking Methodology of Design Architecture with AXI Crossbar

    Case Study

    By Ankit Srivastava

    40

    154.  Generic Mathematical Model to evaluate Full Chip Dynamic Voltage Drop based on

    Operational Frequency and Utilization

    By Nishant Srivastava

    40

    155. 

    IP Header Compression

    By Saurabh Srivastava

    40

    156.   Automatic Identification of Cephalometric Landmarks

    By Srujan Kumar V. H. N.

    41

    157.  System Dynamics of a Fresh food Store

    By G. S. Neeraj Subramaniyan

    41

    158.  Shortest Path Algorithm

    By P.S.V.SuryaNarayana

    41

    159.  Game AI Library for NPC Motions in Mobile Games

    By Satyajit Swain

    41

    160.   An Empirical Investigation of Capital Asset Pricing Model in India

    By Ankit Talwar and Anushree Goenka

    42

  • 8/8/2019 Full Catalogue 2005 09

    14/64

      xii

    161.   Web-based Application for Querying Institute Ontology

    By Rajat Taneja and Shobhneet Bhargava

    42

    162.  Implementation of Coverage Driven Verification for verifying AHB Bus using Axiom CDF

    By Rahul Todi

    42

    163.  Feature enhancement and Code Quality improvement for Camera Software

    By Sai Gopal Thota

    42

    164.  SMG Web Development

    By Anupriya S.Tyagi

    43

    165.  System Dynamics Model for National Parks

    By G.Vamshi Krishna

    43

    166.  Developing of Web Services Using WS-Engineer

    By T.Vamsi Krishna

    43

    167.   Verification Of Graceful Tree Conjecture

    By K. Phani Kumar Varma

    43

    168.  3D Simulation and Environment Visualization

    By Varun Varshney

    44

    169.   Tata Nano: A Case Study Using System Dynamics

    By Risav Kumar Verma and Sai Charan Puvvala

    44

    170. 

    Low power NEDA based 1D-DCT Architecture

    By Harshal Ved

    44

    171.  Implementation of Adaptive Filters using Subband and Frequency Domain Techniques

    By Irukulapati Naga Vishnu Kanth and Seshu Srinivas Balu

    44

    172.  Embedding of Binary Trees in Hypercube and Related Graphs

    By Khushvant Yadav

    45

     Author Index 46Supervisor Index 49

  • 8/8/2019 Full Catalogue 2005 09

    15/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    1

    B. Tech Projects (Abstracts)

    2005-2009

     Author:  Abhinav Vijay (200501091) and Malik, Kunal (200501119)Title:  Ultra Wide Band Transmission and Receiver Design; 5 p.; 2009.

    Supervisor:  Gupta, SanjeevKeywords:  Ultra wide band; UWB; Multiple-mode resonator; Ultra wide band receiver; Advanced design

    system; Low noise amplifier. Abstract:  This Report presents the work done in the design of an Ultra Wide Band [1] (UWB) Receiver. In

    the process of designing the receiver we have integrated Antenna, Band Pass Filter and Amplifierinto one complete circuit. The preferred designs for the integration are Microstrip antenna[2]operating at UWB frequency, multiple-mode resonator(MMR) for the filter and three cascaded Agilent HMMC-5200 series-shunt heterojunction bipolar transistor[3] (HBT) amplifiers foramplifier module. The layout and simulations of the Microstrip Antenna have been performed using Agilent Momentum while the schematics and simulations of filter and UWB amplifiers have been

    performed using Agilent Advanced Design System (ADS) Schematic. Before implementing thereceiver we implemented a 915 MHz receiver and a UWB Low Noise Amplifier whose schematics,simulations and results are included herein.

     Author:  Aditya Prakash (200501013) and Sidharth Kumar (200501014)Title:  Air for Human Simulator (AFHS)- Graphical Simulation and Physical Study of Inhaled Air; 4 p.;

    2009.Supervisor:  Jotwani, Naresh and Dutta, GautamKeywords:  Cardiovascular system; Graphical simulation; Human body; MAYA; Respiratory system; Simulation

    of physics. Abstract:  Air for Human Simulator (AFHS) is a unique and novel approach to understand the course of the

    inhaled air inside the human body whereby users can easily understand the steps for the

    consumption of air inside our body, with the help of 3D graphical modeling and simulation of thephysics. AFHS subsequently concentrates on the 3D modeling and simulation of the cardiovascularsystem and the respiratory system, the two systems responsible for the proposed process andthereby demonstrates there individual and parallel functionalities with the help of 3D models,simulations and graphs (wherever needed).

     Author:  Agarwal, Ambuj (200501065)Title:  Parking Lot Management System; 3 p.; 2009. 

    Supervisor:  Mitra, Suman K.On site

    Supervisor:Piriyakumar, D. Antony Louis, Siemens CT India

    Keywords:  Parking lot; Integrated systems; Smart cameras; WiFi network.

     Abstract:  Parking Lot Management essentially deals with the placement of parking spaces, ticketing of theparked vehicle and also managing the empty slots efficiently. Here we discuss a vision based systemthat caters to the first two of the above needs integrating it with the security systems. Apart fromthese the system allows for a flexible platform to add various features at a later point of time.

  • 8/8/2019 Full Catalogue 2005 09

    16/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    2

     Author:  Agarwal, Himanshu (200501172)Title:  Intelligent Traffic Management - Segregation of Vehicles using Video Images; 11 p.; 2009. 

    Supervisor:  Mitra, Suman and Roy, Anil K.Keywords:  Background subtraction; Connected component analysis; Dilation, erosion; Template matching;

     Tracking. Abstract:  One of the key aims of any advanced traffic management system is to be able to identify traffic rule

     violating vehicles automatically and soonest as well. The current vehicle detection system, such as

    license plate detection, identifies vehicle’s license plate which subsequently may provide only theaddress of the vehicle owner using the RTO database. Our project is targeted to develop a newfeature for any city’s traffic management system by providing an automatic system capable of takingreal-time input from fixed video camera, segregating two wheeler vehicles. We hope that thismodule can then be used for multiple purposes by the City Traffic Commissioner. This reportdescribes the designed algorithm used to achieve the desired goal.

     Author:  Agarwal, Ritu (200501082)Title:  On Uniquely Diagnosable Fault Sets in Diagnosable Systems; 5 p.; 2009. 

    Supervisor:  Amin, Ashok T.Keywords:  Fault set; Hybrid fault set; Intermittently faulty units; Permanently faulty units; Syndrome; T-

    diagnosable

     Abstract:  A self diagnosable system is a system which has the capability of testing its subunits anddetermining its faulty units. Various approaches have been developed to identify the set of faultyunits by studying a collection of test results produced by the system. One such approach is todetermine the set of conditions which should be satisfied by a system to have uniquely identifiablefaulty units. Thisreport deals with a set of such conditions and

    1. For the case of symmetric invalidation, it rewrites the proof of necessity and sufficiency of theconditions so that it is more accessible2. For the case of symmetric invalidation with permanent faults, it

    a. makes explicit a restriction on the size of the fault set andb. simplifies the conditions and develops an efficient algorithm for their implementation.

     Author:  Aggarwal, Vineet (200501099)Title:  p-n Junction Solar Cell Simulator - Graphical Simulation and Physics of Solar Cell; 4 p.; 2009. 

    Supervisor:  Jotwani, Naresh and Parikh, ChetanKeywords:  p-n Junction; Solar cell; MATLAB; Absorption coefficient; Optical intensity; Generation rate;

    Current, Power. Abstract:  The solar cell simulator is designed and built for different p-n homojunction solar cell like Silicon,

    Gallium Arsenide and Indium Phosphide. Simulator user starts by entering various parameters forthe solar cell. Simulator then calculates various graphs and different values like power, current andthe efficiency of the solar cell with the help of the physics involved in a solar cell. The user can playthe animation to watch and learn the movements of charge carriers.

     Author:  Agrawal, Ankit (200501173)

    Title:  Context Aware Semantic Service Discovery; 4 p.; 2009. Supervisor:  Chaudhary, SanjayKeywords:  Context; Ontology; Semantics; Service discovery. Abstract:  This report is a part of an effort to develop a novel context based mechanism to facilitate semantic

    service discovery. Context- awareness is considered to be a key problem in designing more adaptiveapplications. Context modeling and reasoning are important research area of context-awarenesscomputing. At the same time huge amount of data leading to inefficient systems raises a demandfor filtering techniques. A study of existing discovery mechanisms has been done.

  • 8/8/2019 Full Catalogue 2005 09

    17/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    3

     Author:  Agrawal, Manish (200501073) and Jain, Ankit Kumar (200501205)Title:  Design of Stable Adaptive IIR Notch filter using all-pass Lattice Structure; 4 p.; 2009. 

    Supervisor:  C. VijaykumarKeywords:  Least mean square (LMS); All-Pass filter; Lattice structure; Notch filter; Finite impulse response

    (FIR) filter; Infinite impulse response (IIR) filter; Bit Error Rate (BER). Abstract:  In this paper, the adaptive notch filter is implemented using cascades of second order notch filters,

    each of which has been realized using cascades of second order all-pass lattice structure. We have

    used LMS adaptive algorithm to make the system adaptive. Further, a comparison is done on theconverging property and coefficient stabilization of the FIR filter using different variants of theadaptive algorithm Least Mean Square (LMS) vis. Normalized LMS and block LMS used in ourimplementation. Computer simulations show the relative performance of the different algorithmson the basis of bit error rate (BER), coefficient convergence and stabilization and complexity forthe detection of closely-spaced sinusoids and tracking of nonstationary sinusoidal signals.

     Author:  Agrawal, Rohin (200501187)Title:  Detection of Digital Image Manipulation; 7 p.; 2009. 

    Supervisor:  Roy, Anil K. and Desai, BinitaKeywords:  Image Forensics; Image Manipulation; Least square approximation; Surface normals;

    Decorrelation.

     Abstract:  Manipulation in image has been in practice since centuries. These manipulated images are intendedto alter facts – facts of ethics, morality, politics, sex, celebrity or chaos. Image Forensic Science(Image Forensics) can be used to detect manipulation(s) in a digital image. There are many standard way to analyze an image for manipulation. We propose a new method that is based on light and itsshade. It measures the direction of light source and uses the light based technique for identificationof any intentional manipulation in the said digital image.

     Author:  Anuj Kumar (200501097)Title:  Design and Development of Mobile Intelligent Tutoring Systems; 6 p.; 2009. 

    Supervisor:  Banerjee, AsimCo-

    Supervisor:Kam, Matthew, Carnegie Mellon University

    Keywords:  Cellphone; Decision Tree; Intelligent Tutors; English as Second Language (ESL) Abstract:  Learners are a diverse population, varying in their skills, interest and learning process. This paper

    presents the design, implementation and evaluation of 2-cellphone based intelligent tutors that haveundergone 2 iterations each. Intelligent Tutors are tutors that can adapt to learners response, andprovide individualized learning thus accounting for their diversity. We have designed 2 suchapplications and field-tested them with children. Each application’s tutoring system is representedusing a decision tree that helps in understanding software’s response to numerous inputs form thelearner. This paper presents the development of these decision trees based on participatory design where the applications were modified based on user performance, observation and feedback.

     Author:  Aravindh, V. V. (200501115)Title:  Health-checking and Verification of the DDR3 Subsystem and Survey of Clock Domain Crossing;

    6 p.; 2009. Supervisor:  Dubey, Rahul

    On siteSupervisors:

     Varshney, Sanjeev and Dontam, Ramesh Babu

    Keywords:  DDR3 Subsystem; Synthesis; PCTL; Scheduler. Abstract:  This report comprises of the work carried out at ST Microelectronics for the B-Tech project. In

    this report, there are details of techniques and issues for synthesis of a given digital design, commondiscrepancies observed in a digital design, as exercised in the industry. An overview of the DDR3subsystem is included. The rationale behind the operation of the DDR3 subsystem and its verification is included. A literature survey on metastability and solutions for this issue is presented

  • 8/8/2019 Full Catalogue 2005 09

    18/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    4

    after the verification process of the DDR3 subsystem.

     Author:  Arjun Singh (200501201)Title:  Hybrid Approach to Digital Watermarking Using Independent Component Analysis and Spread

    Spectrum; 7 p.; 2009. Supervisor:  Mitra, Suman K.

    Keywords:  Digital Watermarking; Independent Component Analysis; Multiple watermarking; Spread Spectrum Abstract:  An effective way to ensure copyright protection and security of digital images is digital

     watermarking. This report compares and analyzes Spread Spectrum and Independent Component Analysis techniques for watermarking digital images. As both these schemes exhibit complementaryrobustness to a large range of attacks, we propose a novel hybrid which is double watermarkedusing the two schemes. This hybrid is robust to a wide range of attacks.

     Author:  Bagga, Sumit (200501038)Title:  Experimental Evaluation of Dynamic Data Structure for Point Location Problem; 2 p.; 2009. 

    Supervisor:  Chatterji, SamareshKeywords:  Dynamic Data Structure; External Memory; Planar Subdivision; Point Location Abstract:  Point Location is a well-known problem in computational geometry with numerous applications in

    graphics, geographic information systems, etc. In many of the applications, the data is massive andhas to be stored in external memory. In such situations, I/O performance becomes a critical factor.It is proposed to experimentally evaluate the dynamic data structure put forward by Arge, Brodaland Srinivas Rao.

     Author:  Bagla, Sumit (200501223)Title:  Performance Analysis Tools for ARM; 4 p.; 2009. 

    Supervisor:  Banerjee, AsimOn site

    Supervisor:Reddy, Allam Suresh, Engineer, Staff/Mgr, Qualcomm Corp.

    Keywords:  Babylon; LTTng; Performance analysis tool. Abstract:  To identify set of performance analysis tools for Linux OS based systems on ARM platform. The

    focus is to analyze the tools, its granularity and accuracy, and provide support for them on theLinux kernel to meet the requirements of BSP (Board Support Package) team of Qualcomm IndiaLtd., Hyderabad.

     Author:  Baphna, Ankit (200501220)Title:  BREW MP Eclipse Plugin; 4 p.; 2009. 

    Supervisor:  Banerjee, AsimOn site

    Supervisor: Simhadri, Arun Kumar, Engineer, Staff/Manager, Qualcomm India Pvt. Ltd.

    Keywords:  Automation, brew; Build; Nmake. Abstract:  Qualcomm introduces eclipse plugins for BREW MP which aids developers to develop BREW

    applications on an open source platform. Main aim of Qualcomm behind these plugins is to give

    the developers all the support that is needed to develop and test BREW MP applications on anopen source platform. This requires support on Eclipse IDE as an alternative for Microsoft’s VisualStudio, CodeSourcery and RVCT as an alternative for ARM compliers and MinGW make/GCCmake as an alternative for Microsoft’s nmake to generate various .bid, .bif and .dll files. My projectis to make a template of the makefile that is compatible with CodeSourcery and RVCT toolchainthat uses functionality of MinGW make that can be used by the makefile generator to generate themakefile needed to build the BREW MP project depending upon the options selected by the user. Also I need to design the framework to test the BREW MP Eclipse plugin and schema to integratethose with the build machine.

  • 8/8/2019 Full Catalogue 2005 09

    19/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    5

     Author:  Baser, Puneet (200501178) and Mundra, Anik (200501231)Title:  Broadband Beamforming; 4 p.; 2009. 

    Supervisor:  C. VijaykumarKeywords:  SLC; SONAR; RADAR; ULA; UCA; DOA; MVDR; SVD; CDMA [5] Abstract:  The report is projected for analyzing propagating waves thereby extracting signal parameters of

    interest and detecting source location from where propagating wave is generated. We will bediscussing various narrowband beamforming algorithms followed by implementation and

    simulating results of those algorithms. Beamforming is a technique employed for determining thedirections of propagation of several signals moving past an array. Traditionally, Adaptivebeamforming has been employed primarily in sonar and radar systems. It started with the inventionof the intermediate frequency sidelobe canceller (SLC) in 1959 by Howells. The concept of a fullyadaptive array was developed in 1965 by Applebaum [3]. Beamforming has wide applications inareas of acoustics, SONAR applications and seismology and wireless communication applicationslike RADAR applications.

     Author:  Batra, Sangam (200501043)Title:  Contour Extraction of Moving Object in a Still Camera Video; 5 p.; 2009. 

    Supervisor:  Mitra Suman K.Keywords:  Background subtraction; Contour; Convex hull; Frame; Gradient vector flow; Initialization; Snake

     Abstract:  This report proposes an efficient approach for contour extraction of a moving object in a stillcamera video. For the detection and tracking of moving object, an efficient background subtractiontechnique proposed by Singh et al. is used. Gradient Vector Flow (GVF) model is used for thepurpose of contour extraction. The problem of manually initializing the contour in every frame isaddressed by automating the process of contour initialization. The automation is done using a fastand simple technique. Results are shown for different videos towards the end of the report.

     Author:  Bhagya, Rohit (200501040) and Gupta, Pawan (200501216)Title:  Aperture Coupled Microstrip Antenna; 5 p.; 2009. 

    Supervisor:  Gupta, SanjeevKeywords:  Aperture coupled microstrip antenna; Microstrip antenna; Return loss Abstract:  Microstrip antennas have become immensely popular in recent times owing to their low

    manufacturing cost and compactness and are being increasingly employed in microwave systems. This paper first discusses basics of antenna and aperture coupled microstrip antennas and then goeson to describe the design of a low cost aperture coupled microstrip antenna having a return loss of -37.8 dB at 1.4 GHz.

     Author:  Bhargava, P. V. Vijay (200501121)Title:  Polarimetric SAR Data Processing; 4 p.; 2009. 

    Supervisor:  Banerjee, AsimKeywords:  Polarimetric Radar; Speckle Filtering; Polarimetric Signature Extraction; RADARSAT Data Abstract:  The European Space Agency developed a tool called PolSARpro to facilitate the accessibility and

    exploitation of multi-polarized SAR datasets including those from ESA Third Party Missions(ALOS PALSAR), Envisat ASAR Alternating Polarization mode products, RADARSAT-2 and

     TerraSAR-X. Indian Space Research Organization (ISRO) has similar requirements of indigenouslymade tool; fully customized to meet their specific conditions. In this report, I have attempted todescribe the basics of Polarimetry required for understanding the applications of POLSARPRO. The definitions are followed by brief descriptions of the modules implemented.

  • 8/8/2019 Full Catalogue 2005 09

    20/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    6

     Author:  Bhatia, Nitesh (20001071)Title:  Parallel Query Optimization for Join Framework of Pig Latin; 4 p.; 2009. 

    Supervisor:  Chaudhary, SanjayKeywords:  Pig Latin; Hadoop; Parallel query processing; High-level language. Abstract:  In present era of Internet dominated market, large scale Parallel-Processing data-flow systems have

    attracted attention. Pig Latin is a high-level data-flow language that has been build on Hadoop - anopen source map-reduce implementation. This language provides greater transparency in structure

    of program and has opened path for automatic optimization. This report proposes optimizationstrategies for Join framework of Pig Latin based on Parallel QueryProcessing techniques. Through optimization we believe that this will trigger a mass migration fromlow-level programming (like direct Map-Reduce or Dryad) to high-level programming (like PigLatin)

     Author:  Bikualla, Avinash (200501227)Title:  Predict Neural Networks Output more Accurately Using OpenMP Application Program Interface

    (API); 4 p.; 2009. Supervisor:  Chaudary, SanjayKeywords:  Backpropagation algorithm; Data mining; Hyperthreading technology; Message passing interface;

    multithreading, Neural networks, OpenMP.

     Abstract:  One of the tasks of Data mining is to classify and predict the data from a large repository ofdatabases. By analyzing the data from different domains, useful information can be extracted. Aneural network is an example of data mining classification techniques. Neural networks have to betrained before they can be used for prediction of data. This requires large repository ofcomputational power. If they are trained sequentially, it takes a large amount of time; therefore it isbetter to implement those using parallel programming techniques. Usage of OpenMP API on Intelmulti-threading architecture will give good results. After implementing this model, we are testing theperformance of this model by comparing the performance of this model in different environments.

     Author:  Bontha, Srikanth Reddy (200501120) and Dasksha GouriTitle:  PC-Based Tool for Comprehensive Test Application; 4 p.; 2009. 

    Supervisor:  Jat, P. M.

    On SiteSupervisor: 

    Sridhar, Nomula, Engineer, Qualcomm India pvt Ltd., Hyderabad

    Keywords:  CTA (Comprehensive Test Application); FTA (Functional Test Area); XML (Extensible MarkupLanguage); BREW (Binary Runtime Environment for Wireless systems); WM (Windows Mobile).

     Abstract:  Comprehensive Test Application is an embedded application that resides on the phone and helps intesting various modules present in the phone.Our project objective is making a desktop applicationfor Comprehensive Test Application which will reduce the user’s effort in using Comprehensive Test Application to a very considerable amount and also improves the efficiency.

     Author:  Boppudi, Ravi Teja (200501214)Title:  No-Three-in-Line Problem; 4 p.; 2009.

    Supervisor:  Chatterji, Samaresh

    Keywords:  No-Three-in-Line; Jainendra K. Navlakha's Algorithm Abstract:  In this project, one of the unsolved problems in Mathematics, No-three-in-line problem, is solved

    for even squared matrices using Jainendra K. Navlakha’s algorithm[1] and the algorithm developedby me.

  • 8/8/2019 Full Catalogue 2005 09

    21/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    7

     Author:  Chandra , P. Satish (200501126)Title:  Optical Character Recognition; 5 p.; 2009. 

    Supervisor:  Joshi, Manjunath V.On site

    Supervisor:Bagaria, Venkatesh, Siemens

    Keywords:  OCR; MSER; CSER; Pattern Matching; Sauvola’s Thresholding and Union–Find Abstract:  The report consists of different approaches by which a robust machine vision OCR (Optical

    Character Recognition) can be implemented. A modular approach, a pattern matching approachand an approach using MSER (Maximally Stable Extremal Regions) was looked at keeping in mindthe simplicity and speed of the algorithm in order to be able to run on embedded hardware.

     Author:  Chandra, Sakshi (200501101) and Agarwal, Somya (200501186)Title:  Acyclic Orientation of Undirected Graphs to Maximize Reachability; 4 p.; 2009. 

    Supervisor:  Amin, Ashok T.Keywords:  Acyclic Orientation; Reachability; Undirected graph. Abstract:  Let G be an undirected graph with n vertices and m edges. (G, R) denotes acyclic directed graph

    obtained from undirected graph G by acyclic edge orientation of G. Let r(G, R) denotes thereachability of (G, R). The problem is to find an acyclic orientation (G, R) of G such that r(G, R) is

    maximized.

     Author:  Chaplot, Vikrant (200501057)Title:  Bluetooth Security Using Identity Based Encryption; 4 p.; 2009. 

    Supervisor:  Das, Manik LalKeywords:  Bluetooth security; Elliptic curve cryptography; Identity based Encryption; Strand spaces. Abstract:  The Bluetooth is a wireless technology which is used to transfer voice and data between Bluetooth

    enabled devices separated by short distance. Since the medium of transfer is wireless, securing databecomes utmost important. Most of the security features used in Bluetooth today are based onsymmetric key cryptography having a drawback that the user has to manually enter the secretpasskey into both the communicating devices. In this paper we present one Bluetooth securityprotocol based on Identity Based Encryption. It uses the identity of a device to encrypt the data.

    Here security relies on Elliptic Curve Discrete Logarithm Problem. We also present a formal proofof correctness for the proposed protocol using Strand Space Technique.

     Author:  Cheedi, Kalyan (200501225)Title:  Algorithms for finding a Minimal Dominating Set in a Graph; 5 p.; 2009. 

    Supervisor:  Chatterji, SamareshKeywords:  Maximal independent set (MIS); Minimum connected dominating set (mCDS); Virtual backbone,

    ad-hoc networks. Abstract:  The project relates to an application of graph theory in wireless ad-hoc and sensor networks. The

    challenge to this field of networks is that the medium and user are mobile or are dynamic in nature.Motivated by the concept of search in a virtual backbone set up is the solution to the problem ofminimal Dominating set (MDS) which finds applications in routing and connectivity in wireless ad-

    hoc networks. Also involved with this problem is the problem of maximal independent set (MIS).Solution to MIS makes it easier to implement the problem of MDS. The work in the projectincludes implementing and comparing two algorithms, which are different in approach, by analyzingtheir performance for different cases of connectivity and the number of nodes in the ad-hocnetwork.

  • 8/8/2019 Full Catalogue 2005 09

    22/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    8

     Author:  Chitneni, B. K Nagarjuna (200501144)Title:  OLAP Technology for Business Intelligence Analytics System in Retail Enterprises; 4 p.; 2009. 

    Supervisor:  Banerjee, AsimKeywords:  Online analytical processing (OLAP); Intelligence analytics system; Database model Abstract:  The relational database model is probably the most frequently used database model today. It has its

    strengths, but it doesn’t perform very well with complex queries [1] and analysis of very large sets ofdata. As computers have grown more potent, resulting in the possibility to store very large data

     volumes, the need for efficient analysis and processing of such data sets has emerged. The conceptof Online Analytical Processing (OLAP) was developed to meet this need. Now a days BusinessIntelligence applications are powered by OLAP software. OLAP produces a new generation ofanalysis and reporting capabilities through customized “cubes”, where critical business processes inan enterprise, such as product, month, and number of sales are represented as dimensions in thecube. OLAP represents a major improvement in reporting and analysis because the cubes importfrom existing databases, spreadsheets, data warehouses, and data marts into a far more flexible andpowerful reporting and analysis application. Our Project “OLAP Technology for BusinessIntelligence Analytics System” deals with Analytics module to analysis day to day operations basedon reports chosen by the retailers.

     Author:  Chittor, Aditya (200501129)

    Title:  Design Pattern Recognition Using DSM; 5 p.; 2009.Supervisor:  Jat, P. M.Keywords:  Design pattern; Dependency structure matrix. Abstract:  Design patterns form a very important part in object-oriented programming. Identifying the design

    patterns can make repairing, reverse engineering or analyzing the architecture of software muchsimpler. A Dependency Structure Matrix (DSM) is used to display all the dependency in thesoftware in a tabular form. The DSM can be used to analyze and spot the patterns. It is also aconvenient way to represent them. Design patterns are of 3 types: structural, behavioral andcreational patterns. I have developed a tool to identify structural patterns in software source code(Java only). The tool extracts dependencies from a matrix using conventional static analysis. Thisdata is then used to identify within the software three standard structural patterns including Adapter, Proxy and Decorator. An algorithm is developed to efficiently identify the pattern.

     Author:  Chouhan, Kishan Singh (200501028)Title:  Activity and Budget Monitoring System for ATMA; 10 p.; 2009.

    Supervisor:  Chaudhary, SanjayKeywords:  Information system; ATMA; Activity; Monitoring; Reports; Session bean; Web Service. Abstract:  This Project is intended to develop an information system for ATMA to enhance its capabilities for

    effective monitoring of activities and budget. Developed system also enables ATMA authorities todo queries to the system like compare between two or more activities and generate results as areport and in a graphically manner too for better analysis. System also provides support forpreparation of ATMA’s monthly, half yearly and annual reports. For implementing this system Ihave used Enterprise Java Beans architecture. Session beans are responsible for all functionalitiesand they can be exposed as Web Services to make this information system worldwide. I haveexposed few session beans as web service as a part of this project.

     Author:  Chauhan, Sidhartha (200501164)Title:  Designing CIL Connector to Scyther; 3 p.; 2009.

    Supervisor:  Mathuria, Anish M.Keywords:  CAPSL; CIL; Scyther; Parser; Connector; JAVA. Abstract:  In this report we shall take a look at the concepts behind building a parser in JAVA and later we

    shall go into details on how to build a parser which parsers the CIL input and produces Scyther’stool specific language as output. This parser is the Connector we desire.

  • 8/8/2019 Full Catalogue 2005 09

    23/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    9

     Author:  Chowdhary, B. Aneesha (200501146)Title:  Development and optimization of CMOS Structured ASIC Libraries; 4 p.; 2009.

    Supervisor:  Mandal, ShushantaKeywords:  ASICs; Design; Structured ASICs; Standard cell library Abstract:  As we all know, a new category of devices - Structured ASICs are increasingly becoming available to

    fill in the gap of the programmability spectrum, which consists of FPGAs at one end and thestandard cell ASICs at the other end. Structured ASICs have adopted best features of FPGAs and

    standard cell ASICs. They are closer to FPGAs in terms of cost and lesser turn-around design times,and closer to ASICs in terms of low power and performance. This paper addresses issues related todevelopment and optimization of CMOS structured ASIC libraries. Challenges and problemsrelated to development of 65nm and 45nm technology library are addressed. Since technologies arerapidly changing, the cell library has to be developed from scratch more frequently. Building ofthese high performance cell libraries not only reduces time and cost of generation and maintenanceadequately (enabling new technologies to adopt quickly) but reduces design cycle to half.

     Author:  Daggumati, Pallavi (200501122)Title:  Hafnium Oxide Gate Dielectrics for Microelectronics Applications; 6 p.; 2009.

    Supervisor:  Mohan, S.Keywords:  Post deposition annealing; Post metalization annealing; Breakdown voltage; Leakage current.

     Abstract:  The project undertaken involves the study of the role of Hafnium Dioxide (A high-K dielectric) as areplacement for Silicon dioxide in CMOS technology, electrical characterization of the fabricatedMOS capacitors and analysis of experimentally obtained device parameters. HfO2 film has beendeposited by Electron Beam Evaporation. Post Deposition Annealing and Post metallizationannealing of the sample has been done. Capacitance-Voltage analysis, I-V analysis of the sample preand post annealing has been performed.

     Author:  Daiya, Abhishek (200501075)Title:  Lifestyle Modificator; 4 p.; 2009.

    Supervisor:  Roy, Anil K.Keywords:  Intermittent Network Aware Mobile Application; Connected Limited Device Configuration; Mobile

    Information Device Profile; Resting Energy Expenditure.

     Abstract:  Lifestyle is the way we live our life; what we eat, how and when we eat, how much we exercise, how we cope with stressful situations. Lifestyle Modification is a proactive approach towards optimumhealth & wellness by bringing about appropriate changes in the way you live to Live Life More. Today there are lots of resources available over net for providing information about the food we eatbut the way we live today in a fast running world. But this information is not handy as on date. Alsonobody has the time to go through a book, or on the internet to search for contents in our diet. Theneed of hour is to provide such information fast and easily. This is the project to build a mobileapplication which could provide information easily and keep track of calorie intakes of a person.

     Author:  Dantuluri, Udaya Bhaskar (200501145)Title:  Robot Motion Planning; 4 p.; 2009.

    Supervisor:  Chatterji, Samaresh

    Keywords:  Robot motion; Motion planning; Probabilistic roadmap method Abstract:  Robotic Motion planning using probabilistic roadmap method is split into two phases they are the

    construction phase and query phase. In construction phase we construct a probabilistic roadmap inconfiguration space. This roadmap is a graph where nodes and edges correspond to randomlychosen configurations in free space and simple collision-free motions between the nodesrespectively. These motions are computed using a local method. In the query phase we use thisroadmap to find shortest paths between different pair of configurations.

  • 8/8/2019 Full Catalogue 2005 09

    24/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    10

     Author:  Dargar, Apurva (200501175) and Mundra, Ankit (200501219)Title:  A Novel Design for a Current Feedback Amplifier; 6 p.; 2009.

    Supervisor:  Parikh, Chetan D.Keywords:  Current feedback amplifier; Current conveyor; Unity gain buffer. Abstract:  Current Feedback Amplifiers (CFA) are discussed in this report. A detailed analysis of the

    complexities involved in designing a Current Feedback Amplifier with a suitable gain at highfrequencies is undertaken. Various modifications made to the distinct stages of a Current Feedback

     Amplifier to suit to the specifications are elaborated in this report. Novel Current Feedback Amplifier architectures, which employ Buffers with low output impedance and Current Conveyors with very high output impedance are proposed in this report.

     Author:  Das, Aniruddha (200501052) and Ramnani, Vikas (200501044)Title:  Improvised filter designs for Performance Enhancement of Depth Estimation Using Single

    Monocular Images; 10 p.; 2009.Supervisor:  Mitra, Suman K.Keywords:  Computer vision; Depth estimation; Monocular cues; Filter designs. Abstract:  Depth Estimation from Images using monocular cues is a cumbersome process. A number of

    methods have been developed for depth prediction. Techniques for depth prediction from staticimages include using binocular vision, focus-defocus, stereo vision and single monocular images.

     We have discussed the current technique being used in the depth prediction mechanism being usedfor depth estimation from single monocular images. A number of filters are used to extract keyimage characteristics. The filters used have been applied at multiple scales to take into account localand global features. The Gaussian model is used for machine training. Here an attempt has beenmade to design a filter for a more generic application of Depth Estimation algorithm from SingleMonocular Images, so as to reduce the size of the feature vector being used for machine learning. We have altered the filters, in place, so as to decrease the size of the feature vector to improvise theresults for constrained environments or provide an equivalent quality of result as in the previouspapers. This paper introduces filters that reduce the complexity of the algorithm required for depthestimation by reducing the size of the feature vector. The filter presented here has been optimizedfor texture gradient feature extraction. This paper also introduces a post prediction fourth degreeequation to improvise the result predicted by the trained Gaussian model.

     Author:  Das, Prabhu Dutta (200501137)Title:  Mobilizing Community Health Workers to Improve Maternal Health in India; 6 p.; 2009.

    Supervisor:  Banerjee, AsimCo-Advisor: Ramachandran, Divya, PHD Candidate, University of California, BerkeleyKeywords:  Accountability; ASHA; Persuasion; Training. Abstract:  Using community health workers in preventive health interventions can play a pivotal role,

    especially in frontier communities. However, their potential role as health promoters is handicappedby issues beyond their control. Issues in training, acceptance and accountability restrict their selfefficacy in promoting health information addressing-leading causes for mortality in developingcommunities. In this report we discuss the possible mobile-technology intervention for facilitatingpersuasive health information aimed at reproductive health. The fact that the phone can be carriedto the client and used for immediate displays makes for an interesting ubiquitous platform. The

    platform provides scope not only for building persuasive applications but also for collectinginformation which can be mapped to behavioral changes. We discuss design artifacts for one suchapplication- “ASHA SAHAYAK”, its working and import.

  • 8/8/2019 Full Catalogue 2005 09

    25/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    11

     Author:  Dayal, Akash (200501048)Title:  Vehicle Make and Model Recognition; 4 p.; 2009.

    Supervisor:  Raval, MehulKeywords:  Hamming distance; Harris-plessey corner detector; Still image camera; Vehicle recognition Abstract:  With the increasing number of vehicles on the roads a necessity for monitoring the traffic arises. An

    aspect of traffic monitoring is to determine the model and make of the vehicles. I propose toimplement a method to recognize vehicles’ model which is based upon background subtraction,

    feature extraction by corner detection and feature matching by a hamming distance based metricagainst a standard predefined database.

     Author:  Dholakia, Rounak (200501078) and Abhinav Krishna (200501087)Title:  A Case Study in System Dynamics; 6 p.; 2009.

    Supervisor:  Chatterji, SamareshKeywords:  System dynamics; Nonlinear dynamics; Feedback control; Simulation software Abstract:  System Dynamics is grounded in the theory of nonlinear dynamics and feedback control developed

    in mathematics, physics, and engineering [1]. It is a very powerful tool to obtain insight intocomplex dynamics systems. Even a system which appears to be very simple perfunctorily turns outto be complex after analysis through this approach. System Dynamics involves interpreting real lifesystems into computer simulation models that allow one to see how the structure and decision-

    making policies in a system create its behaviour.

     Author:  Dhulipala, Hima Kireeti Srikanth ( 200501136)Title:  High Performance Implementation of Pulsed OFDM for Ultrawideband Communications; 6 p.;

    2009.Supervisor:  C. VijaykumarKeywords:  Multiband OFDM modulation; Pulsed OFDM; Raised cosine window function. Abstract:  In this report, we have mainly described an approach to the implementation of the multiband

    orthogonal frequency division multiplexing (MB-OFDM) ultrawideband (UWB) systems whichgives higher performance than the conventional implementations by applying the ideas of pulsedOFDM. By pulsating the normal OFDM symbols with a duty cycle of less than 1, we are achievinga diversity gain given by inverse of the duty cycle of the pulses. The pulsed OFDM can simply be

    generated by replacing the digital-to-analog convertor (DAC) in an OFDM transmitter with a pulsetrain generator. The generator produces amplitude-modulated pulses with duty cycles of less than 1. This gives a closer approximation of the signal thus improving our estimation.

     Author:  Dubey, Ojas (200501107) and Lalwani, Vishal (200501117)Title:  Semantic Web for Agriculture Production (SWAP); 4 p.; 2009.

    Supervisor:  Chaudhary, SanjayKeywords:  Semantic web; Ontology; OWL; RDF Abstract:  The content available on the World Wide Web today is meant for human consumption. In the

    present web scenario the term information retrieval is quite misleading. The semantic web approachis to present only relevant information to the user based on certain concepts and the relationsbetween them. Moreover, it deals with replacing the current web pages with ones that carry machine

    processable content along with the formatting information. This can be achieved by maintaining thedata in the form of ontologies and using query builders to extract information from them. Thisproject aims to propose an agriculture information system based on semantic web. The informationsystem, unlike existing system, is not based in key word based search but rather uses a newapproach of dynamic query generation based on user input for context base search.

  • 8/8/2019 Full Catalogue 2005 09

    26/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    12

     Author:  Gadde, Apuroop (200501092)Title:  Depth Estimation in a Low Depth of Field image; 4 p.; 2009.

    Supervisor:  Joshi, Manjunath V.Keywords:  Object of interest; Depth of field; Defocus. Abstract:  A low depth of field image belongs to a specific category of images which comprises of only two

    types of pixels. Pixels those are either part of object of interest (OOI) or otherwise. This reportproposes a method to obtain the depth information in such kind of images using the concepts of

    higher order statistics and wavelet transform. In a typical Low Depth if field image the OOI issharp or in other words focused and the remaining part of the image is blurred or defocused. Wediscuss a method the separate the OOI from the background and also estimate the distancebetween the OOI and the background.

     Author:  Gadde, Ramachandra Rao (200501132)Title:  A Randomized Linear Time Algorithm to find Minimum Spanning Trees; 4 p.; 2009.

    Supervisor:  Chatterji, SamareshKeywords:  Minimum spanning tree; Algorithm; Kruskal’s algorithm; Karger, Klein and Tarjan Algorithm. Abstract:  Minimum spanning tree is tree with minimum edge weights in a weighed graph. Many algorithms

    have been proposed to find the Minimum Spanning Tree in a weighted graph. One such algorithmis Karger, Klein and Tarjan Algorithm which is a randomized linear time algorithm to find a

    Minimum Spanning Tree in a connected graph with edge weights. The aim of the project is to studythe algorithm, implement it and compare it with other existing algorithms.

     Author:  Gaddh, Rohan (200501106) and Jain, Khyati (200501235)Title:  On-Line Fair Resource Allocation Scheme in OFDMA Systems Using Cooperative Game Theory; 5

    p.; 2009.Supervisor:  C. VijaykumarKeywords:  Fairness; Game Theory; Nash Bargaining solution; OFDMA scheduling; Online Scheduling Abstract:  This report talks about the problem of resource allocation in Orthogonal Frequency Division

    Multiple Access (OFDMA) systems like WiMAX and 3GPP LTE. The resource allocation schemescan be classified into four categories based on their primary objectives: fairness, system throughputmaximization, power optimization and QoS guarantee. A proportionally fair on-line algorithm has

    been devised to allocate sub-carriers to the users based on the rates at which they choose totransmit. Once the sub-carriers are allocated fairly by Nash Bargaining Model, they are dynamicallyshuffled between the users as the transmission rates change; in order to minimize the cost andmaximize the system throughput.

     Author:  Garg, Amit (200501232) and Jindal, Puneet (200501239)Title:  Development of GSM Protocol through LPC2106 Microcontroller; 5 p.; 2009.

    Supervisor:  C. VijaykumarKeywords:  ARM7TDMI-S; GSM; LPC2106; SIM300 modem; Microcontroller Abstract:  GSM is Global System for Mobile Communication. It is the technology of voice and data

    transmission with the help of authenticated SIM card. This is widely used on end user side intelecommunication networks. Our project intends to develop a GSM protocol to control devices

    remotely by sending specific SMS message from a cell phone. Project is implemented using generalpurpose 32 bit microcontroller LPC2106. This report consists of basic hardware description, projectsetup and implemented protocol.

  • 8/8/2019 Full Catalogue 2005 09

    27/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    13

     Author:  Garg, Sagun (200501098)Title:  Robust Design for M-Banking Client Application on Mobile using Design Patterns; 9 p.; 2009.

    Supervisor:  Banerjee, AsimOn site

    supervisor:Murthy, Siddalinga, TCS-Qualcomm

    Keywords:  M-Banking; Robust Design; Design patterns; Client Mobile Application Design Metrics. Abstract:  M-banking is an important channel for banking services, and in emerging markets, provides some

    possibility for becoming a primary channel. With mostly object oriented applications becomingsuccessful in the market it is an obvious choice for our design. There are two purposes of thisthesis. First, to look into the microarchitectures (object structures) static and dynamic relationsamong objects (and/or their classes) encountered in object-oriented development of client m-banking application. And second, to quantify the quality of de sign. Objects should communicate without becoming entangled in each other’s data models and methods. Design patterns are used tokeep classes separated and prevent them from having to know too much about one another. Loosecoupling for flexible design and encapsulation has been an objective of good object oriented design.Measuring has been the basis for science and engineering since the middle ages. Measurement isnecessary so as to improve the software design, assisting in assessing the quality of a project. Byusing design metrics, a designer can correct software defects which otherwise generally becomehuge design overheads as the project progresses.

     Author:  Gopi, Nitin (200501022)Title:  Semantic Search Engine; 4 p.; 2009.

    Supervisor:  Chaudhary, SanjayKeywords:  Index; Latent semantic indexing; Search engine; Singular value decomposition. Abstract:  The content of the World Wide Web is useful to millions of people. The information seekers use a

    search engine to begin their web activity. Users submit a query, typically a list of keywords, andreceive a list of web pages that may be relevant, typically pages that contain the keywords. Althoughthe search engines are very helpful in finding information on the Internet, they suffer from the factthat they do not know the meanings of the terms and expressions used in the Web pages and therelationships between them. The aim of this work is to show how better algorithms like LatentSemantic Indexing can be used for indexing.

     Author:  Gowtham Srinivas P. (200501090) and Reddy, D. Ravindra Kumar (200501094)Title:  Developing Ontology for Indian Technical Institutes; 5 p.; 2009.

    Supervisor:  Jat, P. M.Keywords:  Ontology; OWL; Semantic web; Objective – Developing ontology for Indian Technical Institutions

    (Typically considering IIT’s and other premier Institutions). Abstract:  In the present web, databases are made available in some form where users, application programs,

    and uses are open-ended and ever changing. In this scenario we should have data along with itssemantics. For human users we can present this data with some presentation form, but forapplication programs and software agents these semantics has to be provided in machineunderstandable and processable form. The ontology includes machine-interpretable definitions ofbasic concepts in the domain and relations among them. As the research done is little to develop aknowledge base in the field of education, we choose to develop ontology for the domain Indian

     Technical Institutions. It includes concepts such as Institutes, Departments, Faculty, Programs,Research Areas, and Cutoff ranks for Program.

     Author:  Goyal, Abhas (200501036) and Gupta , Rubish (200501070)Title:  Portfolio Optimization; 6 p.; 2009.

    Supervisor:  Chatterji, SamareshKeywords:  Optimization methods; Market optimization; Stock optimization Abstract:  The purpose of the project is to study the theory presented in the paper by Thomas Rossier [1],

    First, to validate the implementation of strategy on a simulated market and then apply this strategy

  • 8/8/2019 Full Catalogue 2005 09

    28/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    14

    on the stocks of real Indian stock market.

     Author:  Goyal, Ankush (200501063) and Mishra, Abhinesh (200501155)Title:  An Optimized LVQ algorithm for Multi-interval Discretization of Continuous Values; 5 p.; 2009.

    Supervisor:  Chaudhary, SanjayKeywords:  Multi-interval discretization; Learning vector quantization; Genetic algorithm.

     Abstract:  Discretization of continuous valued features is an important problem to consider duringclassification learning. There already exist a number of successful discretization techniques based onLVQ algorithm. In this work, we have approached the problem of discretization from a differentangle, and have proposed an algorithm based on optimization of Learning Vector Quantization(LVQ) with Genetic Algorithm (GA). LVQ has been employed to function as a classificationalgorithm and discretization is performed using this classification nature of LVQ algorithms. Wehave modeled a GA based algorithm, which enhances the accuracy of the classifier.

     Author:  Goyal, Deep (200501061)Title:  Ontology Matching; 10 p.; 2009.

    Supervisor:  Jat, P. M.Keywords:  Ontology; Ontology matching; Semantic web

     Abstract:  In today’s world of semantic web where efforts are being made to make data over the web to bemachine processable, ontology is playing an important role. But in present scenario, severalontologies are developed by various organizations. They use their own taxonomies and vocabularies. Because of this, interoperability between ontologies is difficult and hence arises theneed of ontology matching. This project aims to demonstrate the concept of ontology matchingusing two heterogeneous ontologies.

     Author:  Goyal, Gourav (200501105)Title:  Public-Key Cryptography Using Paraunitary Matrices over Fields of Characteristic Two; 4 p.; 2009.

    Supervisor:  C. Vijaykumar and Das, Manik LalKeywords:  Public-Key Cryptography; Multivariate cryptography; Paraunitary Matrices; Finite-Fields. Abstract:  A very important issue in the area of cryptography is to build the system faster, efficient and

    secured enough. Although the RSA is secured but still it has some practical problems mainly, key-setup time and size of key. These problems can be solved by multivariate cryptography. There havebeen many schemes developed since last few years. To design a multivariate cryptosystem, Dr. F.Delgosha and Dr. F. Fekri proposed an algebraic approach which is based on formulating a generalsystem of multivariate polynomial equations by paraunitary matrices and given the name asParaunitary Asymmetric Cryptosystem (PAC). A trapdoor one-way function has been designed overthe fields of characteristic two with some approximations to paraunitary matrix. This function isused for encryption/decryption. It has been claimed that the proposed cryptosystem is securedagainst the attacks developed for Hidden Field Equations (HFE). As a conclusion, during my BTP,I have worked and understood the concepts of PAC very clearly by giving a complete analysis ofPAC.

     Author:  Gupta, Aakar (200501025) and Saini, Milan (200501034)Title:  Formal Analysis of Hierarchical Key Assignment Schemes; 6 p.; 2009.

    Supervisor:  Mathuria, Anish M.Keywords:  Key management schemes; Hierarchical key assignment; Diffe-hellman calss of protocol Abstract:  In this work, we study the problem of formal analysis and provable security in key management

    schemes, with focus on the hierarchical key assignment schemes (HKASs). We highlight theabsence and henceforth the need for a proof model in such schemes which handles their dynamicaspect. We then present a new automation tool which models an existing algebraic scheme to verifythe Diffie-Hellman class of protocols (DHCPs) and extends it for various security attributes. Weformulate the model to enable a novel approach of formal analysis of a HKAS based on the

  • 8/8/2019 Full Catalogue 2005 09

    29/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    15

    DHCPs which is supported by the automation tool as well, and which considerably eases theprocess.

     Author:  Gupta, Abhishek (200501068)Title:  Development of C Simulator for AWG based analog & digital video interface; 4 p.; 2009.

    Supervisor:  Dubey, Rahul

    On siteSupervisors:

    Sharma, Vivek Mohan and Gupta, Navneet

    Keywords:  Set-Top box; Arbitrary waveform generator; Flexible digital video output formatter Abstract:  This report explains about the microcontroller known as Arbitrary Waveform Generator, which

    enables to generate any arbitrary waveform using a very simple programming language. The Arbitrary Waveform Generator with some added hardware can be used to generate copy protectionpulses, vertical blanking and horizontal blanking pulses. One of the major applications is that itincreases the flexibility of transferring the video signal in any required standard. This report alsocontains the architecture of the C model of the applications involving Arbitrary WaveformGenerator. The C model which is actually the exact replica of the hardware helps in verification ofthe different firmwares developed for the different video standards.

     Author:  Gupta, Anurag (200501033)Title:  Coreference Resolution using Inductive Logic Programming; 4 p.; 2009.

    Supervisor:  Pandya, AbhinayKeywords:  Annotated corpus; Coreference resolution; Entity; General theory; Mention. Abstract:  Coreference Resolution is one of the major tasks involved in understanding of human languages by

    a computer. Various algorithms, models have been proposed to resolve the mentions of a particularnoun phrase in a text. Inductive Logic Programming is a new thought to address the same problemand seems to be more promising and more concrete in formal representation of a human language which can be easily understood by a computer. The project therefore aims at using Inductive LogicProgramming to generate general theory which can be used by a computer to resolve mentions ofentities in an annotated corpus.

     Author:  Gupta, Divyank (200501190)Title:  File system for Real Time Applications with Continuous Media; 4 p.; 2009.

    Supervisor:  Divakaran, SrikrishnanKeywords:  Admission Control; Continuous media; File system, disk layout Abstract:  Continuous media services are soft real-time applications that require file system services that can

    provide time guarantees. Also delivery of data should satisfy application specific quality of serviceparameters. Conventional file systems are not optimized for continuous media and do not allowclients to influence placement strategy. This project proposes a design for a file system whichattempts to provide effective admission control and file layout policy for continuous media

     Author:  Gupta, Amit (200501035)Title:  Extending Cursor : A New Technique for Enhancing Target Acquisition; 4 p.; 2009.

    Supervisor:  Jotwani, Naresh D.Keywords:  Fitts'law; Interaction Technique; Pointing; Target acquisition. Abstract:  In this paper we present Extending cursor, a new technique for capturing targets. This technique

    attempts to reduce the movement time to acquire the target by reducing the distance of movementbetween target center and cursor position. Extending cursor technique uses two cursors in whichmotion of one cursor is controlled by the other. In order to capture the target on large screens which are becoming more popular nowadays, user employ more hand work and fast mousemovements. This makes the entire pointing process cumbersome thereby making it uneasy to keeptrack on the cursor. We propose a new design to improve pointing task by making less handmovements.

  • 8/8/2019 Full Catalogue 2005 09

    30/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    16

    applications. The file System metadata is modified to increase the efficiency of storage ofcontinuous media data and issues with multiple disk data management are handled.

     Author:  Gupta, Rohit (200501064) and Somani, Abhishek (200501077)Title:  Web Service Discovery and Composition; 6 p.; 2009.

    Supervisor:  Chaudhary, Sanjay

    Keywords:  BPEL; UDDI; Web services; Web services composition. Abstract:  Web service is becoming the next generation of web based application because of their accessibility

    and compatibility. As the number of available Web services increases rapidly, HOW to locate thesuitable Web services is a big challenge. The process of locating or discovering of Web services isknown as Web Service Discovery. But only finding and selecting the suitable services isn't enough,composition of these services to a desired output is also a big issue. This paper provides a briefoverview of Web service technologies and focus on the Universal Description, Discovery, andIntegration (UDDI) which is a standard for publishing and discovery of Web services. Finally, thispaper will also discuss the composition mechanism for Web services using Business ProcessExecution Language (BPEL).

     Author:  Gupta, Sachin (200501176)

    Title:  Secure Data Transmission Protocol for Distributed Wireless Sensor Networks; 5 p.; 2009.Supervisor:  Das, Manik LalKeywords:  Pairwise key establishment; Public key cryptography; WSN security. Abstract:  Wireless Sensor Networks (WSN) is a special type of networked systems characterized by severely

    constrained bandwidth, computational and energy resources. WSN is gaining popularity incommercial and military environment but due to its peculiar characteristics it is prone to vulnerableattacks, thus secure data transmission is now becoming a major concern. Deriving an efficient androbust solution for key establishment, providing authorization and data confidentiality for end-to-end system has become a challenging task. This report addresses the problem of secure datatransmission in distributed WSN and also explaining the reason for reduced efficiency in existingsolutions. We propose a technique for Secure Data Transmission in Distributed Sensor network viaECC and polynomial pool based key predistribution scheme.

     Author:  Gupta, Shekhar (200501010)Title:  A 0.7 Volt High Performance Three Stage OPAMP Using Forward Body Biased Technique; 4 p.;

    2009.Supervisor:  Parikh, Chetan D.Keywords:  Bulk driven circuit; Depletion region; Frequency Compensation; Threshold voltage. Abstract:  In this paper we have designed a very low voltage three stage operational amplifier for biomedical

    instrumentation in standard 0.18µm CMOS technology, to obtain 90 dB dc gain, 20 Mhz gainbandwidth product and 470 of phase margin. The operational amplifier (OPAMP) operates at asupply voltage of 0.7 V. To make circuit stable we have applied single miller capacitance frequencycompensation technique. The high threshold voltage of MOSFET poses a major problem indesigning OPAMP at 0.7V. In order to overcome this we applied a dc voltage 0.35V at the bulk oftransistor. This reduced the threshold voltage of MOSFET. The circuit is designed with load

    capacitance of 10pF.

     Author:  Grandhi, Ravi (200501197)Title:  Crop Estimation Model: Prediction and Simulation; 4 p.; 2009.

    Supervisor:  Chaudhary, SanjayKeywords:  Crop estimation; HPC; Agriculture. Abstract:  In April 2008 the government of India imposed a ban on the rice export of the nation. During the

    beginning of the year 2008 the global food market witnessed a price hike in almost all theagriculture products. The reasons for the hike are very distinct and complex. The World Banks

  • 8/8/2019 Full Catalogue 2005 09

    31/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    17

     Agriculture Unit predicts that the change is weather conditions was also a reason for the pricealteration. India is predominantly an agriculture state. The fluctuations in the food price effects thelife of billions of people. Hence a model to estimate the crops is necessary to further use it topredict the prices of the crops. Since this involves heavy data crunching we need to use HighPerformance Computing.

     Author:  Iraveni, Ashok Kumar (200501111)Title:  Algorithm for Converting SQL into Relational Algebra; 6 p.; 2009.

    Supervisor:  Jat, P. M.Keywords:  SQL (Structured Query Language); Relational Algebra; Syntax; semantics; Relational Schema;

    Relational model; Relations; Aggregate functions; Unary operator; Binary operator; Simple query;Binary query; Complex query; Group by query; Projection; Selection; Union; Intersection; CartesianProduct.

     Abstract:  Structured Query Language (SQL) is the dominant relational model data base language today,comprising commands to define relational algebra objects (DDL – Data Definition Language), andcommands for the data manipulation on relations (DML –Data Manipulation language). In SQLthere may be some group of queries which are syntactically different but semantics of the queries issame. But it is tough to predict which queries have same semantics from group of syntacticallydifferent queries. In this report I will explain about how to find out such queries by following the

    steps of algorithm proposed by me.

     Author:  Jain, Amit (200501081) and Pandey, Sumit (200501104)Title:  Mash-Maker: An Integrated Framework for Developing Next Generation Mashups; 7 p.; 2009.

    Supervisor:  Chaudhary, SanjayKeywords:  Mashups; Next generation mashups; APIs; Integrated framework Abstract:  The new age of the Web is defined by the socialization of content and the free availability of

    information. As a part of this trend most major web application providers expose their services anddata via publically available APIs. Developers use APIs from multiple sources and remix the data toprovide the end user with a new application which has the best of many worlds. These applicationsare called Mashups. Till now, the development of Mashups involved using multiple technologiesand getting multiple data sources to work together as one. The aim of Mash-Maker is to provide the

    developers with a specialized framework that would help in them focus on developing andperfecting their Mashup and also develop reusable components that they could use in futureMashups rather than work out issues posed by various languages in working with each other. Thisreport describes the proposed framework in detail.

     Author:  Jain, Anurag (200501027)Title:  Virtual/Soft Token Based two-factor Authentication; 4 p.; 2009.

    Supervisor:  Das, Manik LalKeywords:  Authentication; Virtual/soft token; Virtual Smart Cards; Hard token; One way hash function; one

    time password (OTP). Abstract:  The security vulnerabilities and thefts are increasing nowadays that represents the weakness of static

    password based authentication system. This causes the significant financial/brand loss to enterprise

    and highlighting the fact that more robust, secure, multifactor dynamic authentication system isrequired. I think that Two factor authentication using Hard tokens (Hardware Electronic Device),and Soft token are next generation methods providing strong authentication using one timepassword system. In this work we discuss the different authentication schemes with their positiveand negative points and finally discussed on Soft token based two-factor authentication.

  • 8/8/2019 Full Catalogue 2005 09

    32/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    18

     Author:  Jain, Anurag (200501050)Title:  DDR2 SDRAM Model Verification Using Palladium and Axis; 4 p.; 2009.

    Supervisor:  Mandal, SushantaOn Site

    Supervisor:Gupta, Piyush

    Keywords:  DDR2 SDRAM; Emulator platform; Palladium; Verification plan. Abstract:  Memories have been an essential component of various digital designs. New and improved memory

    models are continuously being introduced in the market. Currently the most used and trustedmemory used is Double Data Rate2 Synchronous Dynamic Random Access Memory (DDR2SDRAM). In order to verify a design it needs to be tested with an original DDR2 SDRAM. A highamount of fee is paid to memory vendors to lease a memory module. ST Microelectronicsdeveloped a memory module of its own to verify designs on emulator platforms. This project is to verify this new memory module against established DDR2 SDRAM. Since this module is to be usedfor two technologies, simulation acceleration and emulation, as a part of this project I implementedthe module with two tools. A comprehensive study and a comparative study of the two differenttechnologies are also presented in this report.

     Author:  Jain, Chaitanya (200501041)Title:  Dynamic Time Warping Based Approach to Dialect Recognition in Indian English; 4 p.; 2009.

    Supervisor:  Sarkar, Aditi Nath and Patil, HemantKeywords:  Linguistics; MFCC; DTW. Abstract:  Speech has evolved as the primary medium of communication among humans. But some intricacies

    distinguish one regional speaker from another. Such distinctions mark out the speech forms of onegroup from another group as a ‘language’, and of a sub-group as a ‘dialect’. These styles makespeech, region and group specific. The differences still persist even if the speakers from differentregions speak in a foreign tongue, native to none of them.

     This project is aimed at analyzing how, in India, various regional speakers who are speakers ofdifferent languages as their ‘native’ language, differ from each other with respect to theirpronunciation of English. A Dynamic Time Warping based approach has been developed for adialect recognition system for Indian English.

     Author:  Jain, Manish (200501023)Title:  Porting Free RTOS on Wild Cense; 6 p.; 2009.

    Supervisor:  Ranjan, PrabhatKeywords:  Real time operating system; Wild cense; FreeRTOS; Real time. Abstract:  WildCense is a wireless sensor network for studying behavior and movement patterns of wild

    animals. It also gathers microclimatic and positional information of the animals. The whole systemis designed as a network of several nodes. Along with communication with various hardware units, WildCense has to follow some timing constraints for completing its objectives. Achieving theseobjectives becomes more difficult when sequential programming is used for implementing thesystem. Therefore, keeping these requirements into consideration, aim of this project is to portFreeRTOS, a real-time operating system on WildCense for bringing multitasking into the systemand fulfilling all timing constraints besides keeping the system simple and reliable. This report looks

    into the workflow and architecture of WildCense with FreeRTOS.

     Author:  Jain, Mohit (200501088)Title:  Is the Attack Valid? A Tool for Detecting Erroneous Attacks Found by Scyther; 5 p.; 2009.

    Supervisor:  Mathuria, Anish M.Keywords:  Autonomic Framework; Formal Analysis; Attack Validation; Security Protocols. Abstract:  Formal methods have been used for the analysis of security protocols and for detection of flaws in

    them. However, a number of false attacks have been reported in literature. This is a serious problemas good protocols might be rejected because of false attacks. In an autonomic framework, attacks

  • 8/8/2019 Full Catalogue 2005 09

    33/64

    Resource Centre, DA-IICT B.Tech. Projects 2009

    19

    found by automated model checkers needs to be validated, as literature reports model checkersproducing false attacks. The two categories of false attacks reported by the model checker Scytherare Sender’s Incomplete Knowledge Error (SIKE) and Ticket Attacks. In recent research, AndersHagalisletto proposed formal methods and developed a tool to validate attacks on protocols, butthe tool is not publicly available. In this paper, we propose novel formal approaches to detect falseattacks on security protocols under SIKE and Ticket Attack categories. We also developed a tool,SPAA (Security Protocols A