Chaki, Nabendu
Computer Networks & Communications (NetCom)
Part I. The Fourth International Conference on Networks & Communications (NETCOM-2012): Adhoc and Sensor Networks
1. Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network
Manu Sood, Amol Vasudeva
2. A Jini Based Implementation for Best Leader Node Selection in MANETs
Monideepa Roy, Pushpendu Kar, Nandini Mukherjee
3. A Novel Methodology for Securing Ad Hoc Network by Friendly Group Model
Md. Amir Khusru Akhtar, G. Sahoo
4. Energy Efficient Medium Access Protocol for Clustered Wireless Sensor Networks
K. N. Shreenath, K. G. Srinivasa
5. A Design Mode of Streaming Media Transmission and Access in Wireless Video Sensor Network
Mengxi Xu, Chenrong Huang, Shengnan Zheng, Jianqiang Shi
6. PSO-PAC: An Intelligent Clustering Mechanism in Ad Hoc Network
S. Thirumurugan, E. George Dharma Prakash Raj
7. SEMSuS: Semantic Middleware for Dynamic Service-Oriented Sensor Network
V. Sangeetha, L. Jagajeevan Rao
8. CO _2 Gas Sensor Using Resonant Frequency Changes in Micro-Cantilever
S. Subhashini, A. Vimala Juliet
Part II. The Fourth International Conference on Networks & Communications (NETCOM-2012): Heterogeneous Wireless, WLAN and Mobile Networks
9. A Mechanism for Enhanced Performance of Chord DHT in Mobile Environment
Vu Thanh Vinh, Nguyen Chan Hung
10. A Hybrid Model of CLMS and ACLMS Algorithms for Smart Antennas
Y. Rama Krishna, P. E. S. N. Krishna Prasad, P. V. Subbaiah, B. Prabhakara Rao
11. Novel Protection from Internal Attacks in Wireless Sensor Networks
Xu Huang, Muhammad Ahmed, Dharmendra Sharma
12. Channel-Usage Model in Underlay Cognitive Radio Networks
Sanjib K. Deka, Nityanada Sarma
13. Supporting LTE Networks in Heterogeneous Environment Using the Y-Comm Framework
Mahdi Aiash, Glenford Mapp, Aboubaker Lasebae, Ameer Al-Nemrat
14. A Call Admission Control Scheme for Cellular Network to Handle Sudden Influx in a Confined Area
Bhattacharya Adrija, Choudhury Sankhayan
15. Distributed Joint Optimal Network Scheduling and Controller Design for Wireless Networks
Hao Xu, S. Jagannathan
16. On the Estimation Capacity of Equal Gain Diversity Scheme Under Multi-path Fading Channel
Moses Ekpenyong, Joseph Isabona, Imeh Umoren
17. Low Overhead Time Coordinated Checkpointing Algorithm for Mobile Distributed Systems
Jangra Surender, Sejwal Arvind, Kumar Anil, Sangwan Yashwant
Part III. The Fourth International Conference on Networks & Communications (NETCOM-2012): Measurement and Performance Analysis
18. Performance Evaluation of TCP NewVegas and TCP Newreno on Burstification in an OBS Network
K. Ratna Pavani, N. Sreenath
19. Performance Enhancement Through Optimization in FPGA Synthesis: Constraint Specific Approach
R. Uma, P. Dhavachelvan
20. Performance Optimization of Vehicular Ad Hoc Network (VANET) Using Clustering Approach
Ankita Anand, Parminder Singh
21. Performance Evaluation of TCP Congestion Control Variants Using Ad Hoc On-Demand Distance Vector Routing
Mayank Kumar Goyal, Punit Gupta, Vinita Chauhan
22. Performance Analysis of Dynamic Source Routing for Ad-Hoc Networks Using Active Packet
Manish Bhardwaj, Naresh Sharma, Ruchika Saini
23. Overhead Analysis of AODV, TORA and AOMDV in MANET Using Various Energy Models
Manish Bhardwaj, Naresh Sharma, Monika Johri
Part IV. The Fourth International Conference on Networks & Communications (NETCOM-2012): Network Architectures, Protocols and Routing
24. Low Power and High Speed Adders in Modified Gated Diffusion Input Technique
R. Uma, P. Dhavachelvan
25. Guided Local Search for Optimal GPON/FTTP Network Design
Ali Rais Shaghaghi, Tim Glover, Michael Kampouridis, Edward Tsang
26. Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method
Tara Saikumar, Khaja FasiUddin, B. Venkata Reddy, Md. Ameen Uddin
27. Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries
K. Nagamani, A. G. Ananth, K. V. S. Ananda Babu
28. A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Ad Hoc Networks
Yeshavanta Kubusada, Giridhar Mohan, Kiran Manjappa, G. Ram Mohana Reddy
29. User Behavior and Capability Based Access Control Model and Architecture
Meriem Zerkouk, Abdallah Mhamed, Belhadri Messabih
30. Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks
S. Subburam, P. Sheik Abdul Khader
31. An Improved Blind Channel Estimation Based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions
Zaier Aida, Ridha Bouallegue
32. Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System
Vaidyanathan Sundarapandian
Part V. The Fourth International Conference on Networks & Communications (NETCOM-2012): Network Operations and Management
33. Secure Patient Monitoring andSelf-management Using Brain ExpressionInterpreter
Suleyman Kondakci, Dilek Doruk
34. Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN
R. Ramalakshmi, S. Radhakrishnan
35. Hybrid Deployment Schemes for Wireless Sensor Networks
G. Sanjiv Rao, V. Vallikumari
36. Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties
Hao Xu, S. Jagannathan
37. Secure Real Time Remote Video Monitoring System
Deepti C. Gavankar, Madhumita Chatterjee
38. Fully Self-organized Key Management Scheme in MANET and Its Applications
Fuyou Miao, Wenjing Ruan, Xianchang Du, Suwan Wang
39. A Hierarchical Color Net Model for Smart Grid Security Monitoring
Debraj Ghosh, Nabendu Chaki
Part VI. The Fourth International Conference on Networks & Communications (NETCOM-2012): Network Security, Trust and Privacy
40. A Comprehensive Study on Two-factor Authentication with One Time Passwords
Kumar Abhishek, Sahana Roshan, Abhay Kumar, Rajeev Ranjan
41. ITRANS Encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries
V. M. Pathak, M. R. Joshi
42. AB-OR: Improving the Efficiency in Onion Routing Using Attribute Based Cryptography
Nishant Doshi, Devesh Jinwala
43. Pasic: A Novel Approach for Page-Wise Web Application Security
Angamuthu Maheswaran, Rajaram Kanchana
44. Cryptanalysis of Lo et al.’s Password Based Authentication Scheme
Nishant Doshi, Bhavesh Patel
45. Intrusion Detection in Zero Knowledge System Using Model Checking Approach
Teslin Jacob, Mithun Raman, Sanjay Singh
46. Detecting Malicious Users in P2P Streaming Systems by Using Feedback Correlations
Feng-Li Zhang, Yang Bai, Jie Hou, Yuan-Wei Tan
47. An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words
Monika Agarwal
48. Secure Cryptosystem with Blind Authentication
Suhas J. Lawand, Madhumita Chatterjee
49. An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier
A. M. Chandrasekhar, K. Raghuveer
50. A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain
Musheer Ahmad, Bashir Alam, Arpit Jain, Vipul Khare
Part VII. Workshops: The Fourth International Workshop on Network and Communications Security (NCS 2012)
51. A Strong PVSS Scheme
Fuyou Miao, Xianchang Du, Wenjing Ruan, Suwan Wang
52. Secure Cosine Similarity Computation with Malicious Adversaries
Dexin Yang, Baolin Xu, Bo Yang, Jianping Wang
53. Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones
M. Arpitha, V. Geetha, K. H. Gowranga, R. Bhakthavathsalam
54. An Efficient Microaggregation Method for Protecting Mixed Data
S. K. Chettri, B. Borah
55. Plus/Delta (+/ varDelta ) Evaluation to Help Organizations Deliver Projects Effectively
A. Pathanjali Sastri, K. Nageswara Rao
56. A Secure Routing Protocol for MANETs Against Byzantine Attacks
Gagan Singla, Pallavi Kaliyar
57. Analysis of Different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol
Gaurika Talwar, Hemika Narang, Kavita Pandey, Pakhi Singhal
58. NIZKPDS to Achieve Non-repudiation
S. Samundeeswari, V. S. Shankar Sriram
59. An Integrated Solution for Both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study
M. Gnana Seelan, Ch. A. S. Murty
60. A Secure Image Steganography Technique to Hide Multiple Secret Images
S. Hemalatha, U. Dinesh Acharya, A. Renuka, Priya R. Kamath
61. Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities
N. Meghanathan
62. Document Library System Using RDF Based Inferences
Archana P. Kumar, Kumar Abhishek, Abhay Kumar
Part VIII. Workshops: The Fourth International workshop on Wireless and Mobile Networks (WiMoNe-2012)
63. Spread and Erase: Efficient Routing Algorithm Based on Anti-Message Info Relay Hubs for Delay Tolerant Networks
Shikha Jain, Sandhya Aneja
64. Novel Architecture of Adaptive and Optimized Policy Based Handover in MANET
Nidhi Parashar, A. K. Vatsa
65. Trusted Control Information in the Application of Cold Chain Logistics
Li Li, Jia Yingqian, Zhao cuijian, Wu hao
66. PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium
S. M. Koli, R. G. Purandare, S. P. Kshirsagar, V. V. Gohokar
67. Approximate Minimum Spanning Tree for Points Moving in a Euclidean Two-Dimensions Plane
Anil Kumar Sahu, Chintan Mandal, Suneeta Agarwal
68. Low Complexity Speech Enhancement Algorithm for Improved Perception in Mobile Devices
B. S. Premananda, B. V. Uma
69. Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing
Zaheeruddin, Aruna Pathak, Manoj Kumar Tiwari
70. Multimedia Traffic Over MANETs: Evaluation and Performance Analysis
Sunil, Naveen
71. Web Accessibility: Designing and Testing of Web Based Application for Persons with Disabilities
Kalpana Johari, Arvinder Kaur
72. CBADE: Hybrid Approach for Duplication Detection and Elimination
A. Anny Leema, P. Sudhakar, M. Hemalatha
Part IX. Workshops: Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC - 2012)
73. Energy Aware Multipath Routing Protocol for Wireless Sensor Networks
Suraj Sharma, Pratik Agarwal, Sanjay Kumar Jena
74. Virtual Classroom for E: Education in Rural Areas
Vimal Upadhyay, Mukesh Chand, Piyush Chaudhary
75. Unsupervised Methods on Image Database Using Cluster Mean Average Methods for Image Searching
R. Venkata Ramana Chary, K. V. N. Sunitha, D. Rajya Lakshmi
76. Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network
Priyanka Chugh Shivanka, Ashwani Kumar
Part X. Workshops: The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012)
77. Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis
Slawomir Nasiadka
78. Compression of ECG Signals Using a Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database
Sangeeta Gupta, Sujoy Bhattacharya
79. Performance Analysis of ETX and ETT Routing Metrics Over AODV Routing Protocol in WMNs
Satish Hatti, M. B. Kamakshi
80. Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application
Tanuj Mittal, Lokesh Singhal, Divyashikha Sethia
81. Message Efficient Ring Leader Election in Distributed Systems
P. Beaulah Soundarabai, J. Thriveni, H. C. Manjunatha, K. R. Venugopal, L. M. Patnaik
82. RAW: A Novel Reconfigurable Architecture Design Using Wireless for Future Generation Supercomputers
S. Viginesh, G. Vijayraghavan, S. Srinath
83. Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code
Mohammad Abu Hanif, Moon Ho Lee
Keywords: Engineering, Communications Engineering, Networks, Computer Systems Organization and Communication Networks, Signal, Image and Speech Processing
- Author(s)
- Chaki, Nabendu
- Meghanathan, Natarajan
- Nagamalai, Dhinaharan
- Publisher
- Springer
- Publication year
- 2013
- Language
- en
- Edition
- 2013
- Series
- Lecture Notes in Electrical Engineering
- Page amount
- 23 pages
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9781461461548