Ebook: Advances in Computer Science and Information Technology. Networks and Communications: Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I
- Tags: Computer Communication Networks, Information Systems Applications (incl. Internet), Artificial Intelligence (incl. Robotics), Algorithm Analysis and Problem Complexity, Information Storage and Retrieval, Software Engineering
- Series: Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering 84
- Year: 2012
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson networks and communications; wireless and mobile networks; and network security.
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson networks and communications; wireless and mobile networks; and network security.
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson networks and communications; wireless and mobile networks; and network security.
Content:
Front Matter....Pages -
Adaptive Quorum Based MAC Protocol in Non Uniform Node Distribution of Wireless Sensor Networks....Pages 1-9
Mobile Agent in InVANET – Traffic Management....Pages 10-20
The Design of Observers for Nonlinear Control Systems around Equilibria....Pages 21-30
A Node Stability Index-Based Connected Dominating Set Algorithm for Mobile Ad Hoc Networks....Pages 31-40
Energy Efficient Dynamic Routing Protocol for Wireless Sensor Networks....Pages 41-52
Generalized Projective Synchronization of Hyperchaotic L? and Hyperchaotic Cai Systems via Active Control....Pages 53-62
Energy Efficient Stable Connected Dominating Set Construction in Mobile Ad Hoc Networks....Pages 63-72
Hybrid Synchronization of Arneodo and R?ssler Chaotic Systems by Active Nonlinear Control....Pages 73-82
Realization of SDR in Partial Reconfigurable FPGA Using Different Types of Modulation Techniques....Pages 83-89
A Recommender System for Sweaty Sock Syndrome....Pages 90-96
Enhanced AODV Routing Protocol for Wireless Sensor Network Based on ZigBee....Pages 97-102
Sliding Mode Controller Design for the Global Chaos Synchronization of Coullet Systems....Pages 103-110
Generalized Projective Synchronization of Double-Scroll Chaotic Systems Using Active Feedback Control....Pages 111-118
Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey....Pages 119-124
Privacy and Security in Digital Networks from the Perspective of Modeling and Software Development....Pages 125-137
A Logical Topology to Find Alternate Routes in WDM Lightwave Network....Pages 138-145
A Novel Approach for MIMO OFDM Systems to Estimate I/Q Imbalance, CFO, Channel Response Using Training Sequences....Pages 146-158
A Trust Based Routing Scheme for Wireless Sensor Networks....Pages 159-169
Survey of Trust Schemes on Ad-Hoc Network....Pages 170-180
Improve Service Discovery Performance over Different Networks Utilization and Sizes....Pages 181-192
Adaptive K-Means Clustering to Handle Heterogeneous Data Using Basic Rough Set Theory....Pages 193-202
Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata....Pages 203-212
A Location Dependent Semantic Cache Replacement Strategy in Mobile Environment....Pages 213-224
Connectivity of Autonomous Agents Using Ad-Hoc Mobile Router Networks....Pages 225-237
A New Approach to Stegnography....Pages 238-247
Survey on Key Pre Distribution for Security in Wireless Sensor Networks....Pages 248-252
A Link Distance Ratio Based Stable Multicast Routing Protocol for Mobile Ad Hoc Networks....Pages 253-262
A New Security Solution Architecture (SSA) for MANETS against Network Layer Attacks....Pages 263-271
Analysis of Different Associative Memory Neural Network for GPS/INS Data Fusion....Pages 272-284
Handover Latency Measurement of Mobile IPv6 in a Testbed Environment....Pages 285-299
Different Strategy for Data Management in Mobile Computing....Pages 300-305
Generic Network Visualization Tool for Monitoring Adhoc Wireless Networks....Pages 306-315
Adaptive MMSE Equalizer through LMS Algorithm Based CMA Channel Equalization....Pages 316-324
Weighted Angle Based Approach for Face Recognition....Pages 325-333
Multiple Mobile Agents based Data Dissemination Protocol for Wireless Sensor Networks....Pages 334-345
Enhanced Cluster Based Routing Protocol for MANETS....Pages 346-352
Soft Computing Technique Based Call Admission Control Decision Mechanism....Pages 353-367
Mechanisms Supporting Mobility in WSNs....Pages 368-371
An Optimal RPC Based Approach to Increase Fault in Wireless Ad-Hoc Network....Pages 372-382
Location Management and Resource Allocation Using Load Balancing in Wireless Heterogeneous Networks....Pages 383-393
Cross Language Information Retrieval Approach in Peer-to-Peer Network....Pages 394-401
Detecting and Avoiding Wormhole Attack in MANET Using Statistical Analysis Approach....Pages 402-408
Energy Efficient Hierarchical Clustering Routing Protocol for Wireless Sensor Networks....Pages 409-420
An Analysis on Energy Efficient System Design in Grid Computing....Pages 421-428
Cluster-based Power Aware Scheduling (CPAS) Algorithm for Network Longevity in WSN....Pages 429-436
Development of System for GPS Data Transmission to Web Server for Online over Head Conductor Sag Measurement....Pages 437-444
A Comparative Study of Partitioning Algorithms for Wireless Sensor Networks....Pages 445-454
Sensor-Cloud: Assimilation of Wireless Sensor Network and the Cloud....Pages 455-464
Game Theoretic Model for Selfish Node Avoidance in Ad Hoc Networks....Pages 465-476
Performance Evaluation of VANET Using Realistic Vehicular Mobility....Pages 477-489
Ensuring Data Confidentiality and Privacy in Mobile Ad Hoc Networks....Pages 490-499
Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)....Pages 500-509
Dependable Solutions Design by Agile Modeled Layered Security Architectures....Pages 510-519
Block Lanczos to Solve Integer Factorization Problem Using GPU’s....Pages 520-529
Lattice Based Tools for Cryptanalysis in Various Applications....Pages 530-537
Securing the National Knowledge Network....Pages 538-541
Pattern Based IDS Using Supervised, Semi-supervised and Unsupervised Approaches....Pages 542-551
A Secure Session Transfer Protocol for Downloading a Large File across a Cluster of Servers in the Presence of Network Congestion....Pages 552-562
An Improved Anti Spam Filter Based on Content, Low Level Features and Noise....Pages 563-572
Diameter Single Sign On – Secure and Personalized Service Provision via Authentication and Authorization Mechanisms....Pages 573-581
Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems....Pages 582-591
A New Symmetric Key Cryptosystem Based on Feistel Network: Parallel Dependent Feistel Network (PDFN)....Pages 592-601
Survey of Shape Based Boundary Methods for Leaf Retrieval....Pages 602-610
Modified Chain Code Histogram Feature for Handwritten Character Recognition....Pages 611-619
A Novel Image Edge Detection Method Using Simplified Gabor Wavelet....Pages 620-630
Low Power Spatial Modulation Scheme for Wide Band Multiple Input and Multiple Output Wireless Communication Systems....Pages 631-639
Back Matter....Pages -
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson networks and communications; wireless and mobile networks; and network security.
Content:
Front Matter....Pages -
Adaptive Quorum Based MAC Protocol in Non Uniform Node Distribution of Wireless Sensor Networks....Pages 1-9
Mobile Agent in InVANET – Traffic Management....Pages 10-20
The Design of Observers for Nonlinear Control Systems around Equilibria....Pages 21-30
A Node Stability Index-Based Connected Dominating Set Algorithm for Mobile Ad Hoc Networks....Pages 31-40
Energy Efficient Dynamic Routing Protocol for Wireless Sensor Networks....Pages 41-52
Generalized Projective Synchronization of Hyperchaotic L? and Hyperchaotic Cai Systems via Active Control....Pages 53-62
Energy Efficient Stable Connected Dominating Set Construction in Mobile Ad Hoc Networks....Pages 63-72
Hybrid Synchronization of Arneodo and R?ssler Chaotic Systems by Active Nonlinear Control....Pages 73-82
Realization of SDR in Partial Reconfigurable FPGA Using Different Types of Modulation Techniques....Pages 83-89
A Recommender System for Sweaty Sock Syndrome....Pages 90-96
Enhanced AODV Routing Protocol for Wireless Sensor Network Based on ZigBee....Pages 97-102
Sliding Mode Controller Design for the Global Chaos Synchronization of Coullet Systems....Pages 103-110
Generalized Projective Synchronization of Double-Scroll Chaotic Systems Using Active Feedback Control....Pages 111-118
Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey....Pages 119-124
Privacy and Security in Digital Networks from the Perspective of Modeling and Software Development....Pages 125-137
A Logical Topology to Find Alternate Routes in WDM Lightwave Network....Pages 138-145
A Novel Approach for MIMO OFDM Systems to Estimate I/Q Imbalance, CFO, Channel Response Using Training Sequences....Pages 146-158
A Trust Based Routing Scheme for Wireless Sensor Networks....Pages 159-169
Survey of Trust Schemes on Ad-Hoc Network....Pages 170-180
Improve Service Discovery Performance over Different Networks Utilization and Sizes....Pages 181-192
Adaptive K-Means Clustering to Handle Heterogeneous Data Using Basic Rough Set Theory....Pages 193-202
Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata....Pages 203-212
A Location Dependent Semantic Cache Replacement Strategy in Mobile Environment....Pages 213-224
Connectivity of Autonomous Agents Using Ad-Hoc Mobile Router Networks....Pages 225-237
A New Approach to Stegnography....Pages 238-247
Survey on Key Pre Distribution for Security in Wireless Sensor Networks....Pages 248-252
A Link Distance Ratio Based Stable Multicast Routing Protocol for Mobile Ad Hoc Networks....Pages 253-262
A New Security Solution Architecture (SSA) for MANETS against Network Layer Attacks....Pages 263-271
Analysis of Different Associative Memory Neural Network for GPS/INS Data Fusion....Pages 272-284
Handover Latency Measurement of Mobile IPv6 in a Testbed Environment....Pages 285-299
Different Strategy for Data Management in Mobile Computing....Pages 300-305
Generic Network Visualization Tool for Monitoring Adhoc Wireless Networks....Pages 306-315
Adaptive MMSE Equalizer through LMS Algorithm Based CMA Channel Equalization....Pages 316-324
Weighted Angle Based Approach for Face Recognition....Pages 325-333
Multiple Mobile Agents based Data Dissemination Protocol for Wireless Sensor Networks....Pages 334-345
Enhanced Cluster Based Routing Protocol for MANETS....Pages 346-352
Soft Computing Technique Based Call Admission Control Decision Mechanism....Pages 353-367
Mechanisms Supporting Mobility in WSNs....Pages 368-371
An Optimal RPC Based Approach to Increase Fault in Wireless Ad-Hoc Network....Pages 372-382
Location Management and Resource Allocation Using Load Balancing in Wireless Heterogeneous Networks....Pages 383-393
Cross Language Information Retrieval Approach in Peer-to-Peer Network....Pages 394-401
Detecting and Avoiding Wormhole Attack in MANET Using Statistical Analysis Approach....Pages 402-408
Energy Efficient Hierarchical Clustering Routing Protocol for Wireless Sensor Networks....Pages 409-420
An Analysis on Energy Efficient System Design in Grid Computing....Pages 421-428
Cluster-based Power Aware Scheduling (CPAS) Algorithm for Network Longevity in WSN....Pages 429-436
Development of System for GPS Data Transmission to Web Server for Online over Head Conductor Sag Measurement....Pages 437-444
A Comparative Study of Partitioning Algorithms for Wireless Sensor Networks....Pages 445-454
Sensor-Cloud: Assimilation of Wireless Sensor Network and the Cloud....Pages 455-464
Game Theoretic Model for Selfish Node Avoidance in Ad Hoc Networks....Pages 465-476
Performance Evaluation of VANET Using Realistic Vehicular Mobility....Pages 477-489
Ensuring Data Confidentiality and Privacy in Mobile Ad Hoc Networks....Pages 490-499
Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)....Pages 500-509
Dependable Solutions Design by Agile Modeled Layered Security Architectures....Pages 510-519
Block Lanczos to Solve Integer Factorization Problem Using GPU’s....Pages 520-529
Lattice Based Tools for Cryptanalysis in Various Applications....Pages 530-537
Securing the National Knowledge Network....Pages 538-541
Pattern Based IDS Using Supervised, Semi-supervised and Unsupervised Approaches....Pages 542-551
A Secure Session Transfer Protocol for Downloading a Large File across a Cluster of Servers in the Presence of Network Congestion....Pages 552-562
An Improved Anti Spam Filter Based on Content, Low Level Features and Noise....Pages 563-572
Diameter Single Sign On – Secure and Personalized Service Provision via Authentication and Authorization Mechanisms....Pages 573-581
Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems....Pages 582-591
A New Symmetric Key Cryptosystem Based on Feistel Network: Parallel Dependent Feistel Network (PDFN)....Pages 592-601
Survey of Shape Based Boundary Methods for Leaf Retrieval....Pages 602-610
Modified Chain Code Histogram Feature for Handwritten Character Recognition....Pages 611-619
A Novel Image Edge Detection Method Using Simplified Gabor Wavelet....Pages 620-630
Low Power Spatial Modulation Scheme for Wide Band Multiple Input and Multiple Output Wireless Communication Systems....Pages 631-639
Back Matter....Pages -
....
Download the book Advances in Computer Science and Information Technology. Networks and Communications: Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)