Chaki, Nabendu

Computer Networks & Communications (NetCom)

Chaki, Nabendu - Computer Networks & Communications (NetCom), ebook


Ebook, PDF with Adobe DRM
ISBN: 9781461461548
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

Part I. The Fourth International Conference on Networks & Communications (NETCOM-2012): Adhoc and Sensor Networks

1. Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network
Manu Sood, Amol Vasudeva

2. A Jini Based Implementation for Best Leader Node Selection in MANETs
Monideepa Roy, Pushpendu Kar, Nandini Mukherjee

3. A Novel Methodology for Securing Ad Hoc Network by Friendly Group Model
Md. Amir Khusru Akhtar, G. Sahoo

4. Energy Efficient Medium Access Protocol for Clustered Wireless Sensor Networks
K. N. Shreenath, K. G. Srinivasa

5. A Design Mode of Streaming Media Transmission and Access in Wireless Video Sensor Network
Mengxi Xu, Chenrong Huang, Shengnan Zheng, Jianqiang Shi

6. PSO-PAC: An Intelligent Clustering Mechanism in Ad Hoc Network
S. Thirumurugan, E. George Dharma Prakash Raj

7. SEMSuS: Semantic Middleware for Dynamic Service-Oriented Sensor Network
V. Sangeetha, L. Jagajeevan Rao

8. CO _2 Gas Sensor Using Resonant Frequency Changes in Micro-Cantilever
S. Subhashini, A. Vimala Juliet

Part II. The Fourth International Conference on Networks & Communications (NETCOM-2012): Heterogeneous Wireless, WLAN and Mobile Networks

9. A Mechanism for Enhanced Performance of Chord DHT in Mobile Environment
Vu Thanh Vinh, Nguyen Chan Hung

10. A Hybrid Model of CLMS and ACLMS Algorithms for Smart Antennas
Y. Rama Krishna, P. E. S. N. Krishna Prasad, P. V. Subbaiah, B. Prabhakara Rao

11. Novel Protection from Internal Attacks in Wireless Sensor Networks
Xu Huang, Muhammad Ahmed, Dharmendra Sharma

12. Channel-Usage Model in Underlay Cognitive Radio Networks
Sanjib K. Deka, Nityanada Sarma

13. Supporting LTE Networks in Heterogeneous Environment Using the Y-Comm Framework
Mahdi Aiash, Glenford Mapp, Aboubaker Lasebae, Ameer Al-Nemrat

14. A Call Admission Control Scheme for Cellular Network to Handle Sudden Influx in a Confined Area
Bhattacharya Adrija, Choudhury Sankhayan

15. Distributed Joint Optimal Network Scheduling and Controller Design for Wireless Networks
Hao Xu, S. Jagannathan

16. On the Estimation Capacity of Equal Gain Diversity Scheme Under Multi-path Fading Channel
Moses Ekpenyong, Joseph Isabona, Imeh Umoren

17. Low Overhead Time Coordinated Checkpointing Algorithm for Mobile Distributed Systems
Jangra Surender, Sejwal Arvind, Kumar Anil, Sangwan Yashwant

Part III. The Fourth International Conference on Networks & Communications (NETCOM-2012): Measurement and Performance Analysis

18. Performance Evaluation of TCP NewVegas and TCP Newreno on Burstification in an OBS Network
K. Ratna Pavani, N. Sreenath

19. Performance Enhancement Through Optimization in FPGA Synthesis: Constraint Specific Approach
R. Uma, P. Dhavachelvan

20. Performance Optimization of Vehicular Ad Hoc Network (VANET) Using Clustering Approach
Ankita Anand, Parminder Singh

21. Performance Evaluation of TCP Congestion Control Variants Using Ad Hoc On-Demand Distance Vector Routing
Mayank Kumar Goyal, Punit Gupta, Vinita Chauhan

22. Performance Analysis of Dynamic Source Routing for Ad-Hoc Networks Using Active Packet
Manish Bhardwaj, Naresh Sharma, Ruchika Saini

23. Overhead Analysis of AODV, TORA and AOMDV in MANET Using Various Energy Models
Manish Bhardwaj, Naresh Sharma, Monika Johri

Part IV. The Fourth International Conference on Networks & Communications (NETCOM-2012): Network Architectures, Protocols and Routing

24. Low Power and High Speed Adders in Modified Gated Diffusion Input Technique
R. Uma, P. Dhavachelvan

25. Guided Local Search for Optimal GPON/FTTP Network Design
Ali Rais Shaghaghi, Tim Glover, Michael Kampouridis, Edward Tsang

26. Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method
Tara Saikumar, Khaja FasiUddin, B. Venkata Reddy, Md. Ameen Uddin

27. Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries
K. Nagamani, A. G. Ananth, K. V. S. Ananda Babu

28. A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Ad Hoc Networks
Yeshavanta Kubusada, Giridhar Mohan, Kiran Manjappa, G. Ram Mohana Reddy

29. User Behavior and Capability Based Access Control Model and Architecture
Meriem Zerkouk, Abdallah Mhamed, Belhadri Messabih

30. Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks
S. Subburam, P. Sheik Abdul Khader

31. An Improved Blind Channel Estimation Based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions
Zaier Aida, Ridha Bouallegue

32. Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System
Vaidyanathan Sundarapandian

Part V. The Fourth International Conference on Networks & Communications (NETCOM-2012): Network Operations and Management

33. Secure Patient Monitoring andSelf-management Using Brain ExpressionInterpreter
Suleyman Kondakci, Dilek Doruk

34. Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN
R. Ramalakshmi, S. Radhakrishnan

35. Hybrid Deployment Schemes for Wireless Sensor Networks
G. Sanjiv Rao, V. Vallikumari

36. Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties
Hao Xu, S. Jagannathan

37. Secure Real Time Remote Video Monitoring System
Deepti C. Gavankar, Madhumita Chatterjee

38. Fully Self-organized Key Management Scheme in MANET and Its Applications
Fuyou Miao, Wenjing Ruan, Xianchang Du, Suwan Wang

39. A Hierarchical Color Net Model for Smart Grid Security Monitoring
Debraj Ghosh, Nabendu Chaki

Part VI. The Fourth International Conference on Networks & Communications (NETCOM-2012): Network Security, Trust and Privacy

40. A Comprehensive Study on Two-factor Authentication with One Time Passwords
Kumar Abhishek, Sahana Roshan, Abhay Kumar, Rajeev Ranjan

41. ITRANS Encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries
V. M. Pathak, M. R. Joshi

42. AB-OR: Improving the Efficiency in Onion Routing Using Attribute Based Cryptography
Nishant Doshi, Devesh Jinwala

43. Pasic: A Novel Approach for Page-Wise Web Application Security
Angamuthu Maheswaran, Rajaram Kanchana

44. Cryptanalysis of Lo et al.’s Password Based Authentication Scheme
Nishant Doshi, Bhavesh Patel

45. Intrusion Detection in Zero Knowledge System Using Model Checking Approach
Teslin Jacob, Mithun Raman, Sanjay Singh

46. Detecting Malicious Users in P2P Streaming Systems by Using Feedback Correlations
Feng-Li Zhang, Yang Bai, Jie Hou, Yuan-Wei Tan

47. An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words
Monika Agarwal

48. Secure Cryptosystem with Blind Authentication
Suhas J. Lawand, Madhumita Chatterjee

49. An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier
A. M. Chandrasekhar, K. Raghuveer

50. A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain
Musheer Ahmad, Bashir Alam, Arpit Jain, Vipul Khare

Part VII. Workshops: The Fourth International Workshop on Network and Communications Security (NCS 2012)

51. A Strong PVSS Scheme
Fuyou Miao, Xianchang Du, Wenjing Ruan, Suwan Wang

52. Secure Cosine Similarity Computation with Malicious Adversaries
Dexin Yang, Baolin Xu, Bo Yang, Jianping Wang

53. Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones
M. Arpitha, V. Geetha, K. H. Gowranga, R. Bhakthavathsalam

54. An Efficient Microaggregation Method for Protecting Mixed Data
S. K. Chettri, B. Borah

55. Plus/Delta (+/ varDelta ) Evaluation to Help Organizations Deliver Projects Effectively
A. Pathanjali Sastri, K. Nageswara Rao

56. A Secure Routing Protocol for MANETs Against Byzantine Attacks
Gagan Singla, Pallavi Kaliyar

57. Analysis of Different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol
Gaurika Talwar, Hemika Narang, Kavita Pandey, Pakhi Singhal

58. NIZKPDS to Achieve Non-repudiation
S. Samundeeswari, V. S. Shankar Sriram

59. An Integrated Solution for Both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study
M. Gnana Seelan, Ch. A. S. Murty

60. A Secure Image Steganography Technique to Hide Multiple Secret Images
S. Hemalatha, U. Dinesh Acharya, A. Renuka, Priya R. Kamath

61. Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities
N. Meghanathan

62. Document Library System Using RDF Based Inferences
Archana P. Kumar, Kumar Abhishek, Abhay Kumar

Part VIII. Workshops: The Fourth International workshop on Wireless and Mobile Networks (WiMoNe-2012)

63. Spread and Erase: Efficient Routing Algorithm Based on Anti-Message Info Relay Hubs for Delay Tolerant Networks
Shikha Jain, Sandhya Aneja

64. Novel Architecture of Adaptive and Optimized Policy Based Handover in MANET
Nidhi Parashar, A. K. Vatsa

65. Trusted Control Information in the Application of Cold Chain Logistics
Li Li, Jia Yingqian, Zhao cuijian, Wu hao

66. PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium
S. M. Koli, R. G. Purandare, S. P. Kshirsagar, V. V. Gohokar

67. Approximate Minimum Spanning Tree for Points Moving in a Euclidean Two-Dimensions Plane
Anil Kumar Sahu, Chintan Mandal, Suneeta Agarwal

68. Low Complexity Speech Enhancement Algorithm for Improved Perception in Mobile Devices
B. S. Premananda, B. V. Uma

69. Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing
Zaheeruddin, Aruna Pathak, Manoj Kumar Tiwari

70. Multimedia Traffic Over MANETs: Evaluation and Performance Analysis
Sunil, Naveen

71. Web Accessibility: Designing and Testing of Web Based Application for Persons with Disabilities
Kalpana Johari, Arvinder Kaur

72. CBADE: Hybrid Approach for Duplication Detection and Elimination
A. Anny Leema, P. Sudhakar, M. Hemalatha

Part IX. Workshops: Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC - 2012)

73. Energy Aware Multipath Routing Protocol for Wireless Sensor Networks
Suraj Sharma, Pratik Agarwal, Sanjay Kumar Jena

74. Virtual Classroom for E: Education in Rural Areas
Vimal Upadhyay, Mukesh Chand, Piyush Chaudhary

75. Unsupervised Methods on Image Database Using Cluster Mean Average Methods for Image Searching
R. Venkata Ramana Chary, K. V. N. Sunitha, D. Rajya Lakshmi

76. Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network
Priyanka Chugh Shivanka, Ashwani Kumar

Part X. Workshops: The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012)

77. Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis
Slawomir Nasiadka

78. Compression of ECG Signals Using a Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database
Sangeeta Gupta, Sujoy Bhattacharya

79. Performance Analysis of ETX and ETT Routing Metrics Over AODV Routing Protocol in WMNs
Satish Hatti, M. B. Kamakshi

80. Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application
Tanuj Mittal, Lokesh Singhal, Divyashikha Sethia

81. Message Efficient Ring Leader Election in Distributed Systems
P. Beaulah Soundarabai, J. Thriveni, H. C. Manjunatha, K. R. Venugopal, L. M. Patnaik

82. RAW: A Novel Reconfigurable Architecture Design Using Wireless for Future Generation Supercomputers
S. Viginesh, G. Vijayraghavan, S. Srinath

83. Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code
Mohammad Abu Hanif, Moon Ho Lee

Keywords: Engineering, Communications Engineering, Networks, Computer Systems Organization and Communication Networks, Signal, Image and Speech Processing

Publication year
Lecture Notes in Electrical Engineering
Page amount
23 pages
Technology, Energy, Traffic

Similar titles