Online Library TheLib.net » Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers
cover of the book Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers

Ebook: Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers

00
27.01.2024
0
0

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2013, which was held in National Capital Region (NCR) of India during January 2013. The 87 revised full papers were carefully selected from 169 submissions and present the recent technological developments in broadband high-speed networks, peer-to-peer networks, and wireless and mobile networks.




This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2013, which was held in National Capital Region (NCR) of India during January 2013. The 87 revised full papers were carefully selected from 169 submissions and present the recent technological developments in broadband high-speed networks, peer-to-peer networks, and wireless and mobile networks.


This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2013, which was held in National Capital Region (NCR) of India during January 2013. The 87 revised full papers were carefully selected from 169 submissions and present the recent technological developments in broadband high-speed networks, peer-to-peer networks, and wireless and mobile networks.
Content:
Front Matter....Pages -
DSG-PC: Dynamic Social Grouping Based Routing for Non-uniform Buffer Capacities in DTN Supported with Periodic Carriers....Pages 1-15
Integrated Approach for Multicast Source Authentication and Congestion Control....Pages 16-30
Network Selection for Remote Healthcare Systems through Mapping between Clinical and Network Parameter....Pages 31-41
Performance Analysis of SMAC Protocol in Wireless Sensor Networks Using Network Simulator (Ns-2)....Pages 42-51
Routing Protocols in Mobile Ad-Hoc Network: A Review....Pages 52-60
Carrier Aggregation for Enhancement of Bandwidth in 4G Systems....Pages 61-74
A Stable Energy-Efficient Location Based Clustering Scheme for Ad Hoc Networks....Pages 75-85
Comparative Analysis of Contention Based Medium Access Control Protocols for Wireless Sensor Networks....Pages 86-103
SEP-E (RCH): Enhanced Stable Election Protocol Based on Redundant Cluster Head Selection for HWSNs....Pages 104-114
Mobility Based Energy Efficient Coverage Hole Maintenance for Wireless Sensor Network....Pages 115-127
HASL: High-Speed AUV-Based Silent Localization for Underwater Sensor Networks....Pages 128-140
Clusterhead Selection Using Multiple Attribute Decision Making (MADM) Approach in Wireless Sensor Networks....Pages 141-154
Key Pre-distribution in a Non-uniform Network Using Combinatorial Design....Pages 155-170
FLAME: A Flexible and Low-Power Architecture for Wireless Mesh Networks....Pages 171-184
Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA....Pages 185-196
The Outage Analysis of Inter-relay Coded Cooperation over Nakagami-m Fading Channels....Pages 197-206
Power Efficient MAC Protocol for Mobile Ad Hoc Networks....Pages 207-217
Fault Tolerant Range Grouping Routing in Dynamic Networks....Pages 218-227
Deployment of Sensors in Regular Terrain in Form of Interconnected WSN Units....Pages 228-237
3-Tier Heterogeneous Network Model for Increasing Lifetime in Three Dimensional WSNs....Pages 238-247
A Comparative Study of Reactive Routing Protocols for Industrial Wireless Sensor Networks....Pages 248-260
Mobile Based Attendance System in Distributed LAN Server....Pages 261-272
An Improved Method for Contrast Enhancement of Real World Hyperspectral Images....Pages 273-282
Wavelet Analysis of Electrical Signals from Brain: The Electroencephalogram....Pages 283-289
Design and Analysis of Small Planar Antenna Based on CRLH Metamaterial for WSN Application....Pages 290-297
Classification of Speech Dysfluencies Using Speech Parameterization Techniques and Multiclass SVM....Pages 298-308
RoboGardner: A Low-Cost System with Automatic Plant Identification Using Markers....Pages 309-324
6H-SiC Based Power VJFET and Its Temperature Dependence....Pages 325-332
Change Detection from Satellite Images Using PNN....Pages 333-340
Optimal Location and Size of Different Type of Distributed Generation with Voltage Step Constraint and Mixed Load Models....Pages 341-357
Microstrip Patch Antenna Miniaturization Using Planar Metamaterial Unit Cell....Pages 358-364
Simulation and Modeling of a Constant Voltage Controller Based Solar Powered Water Pumping System....Pages 365-376
Design of Low Power FSM Using Verilog in VLSI....Pages 377-386
Pruning Search Spaces of RATA Model for the Job-Shop Scheduling....Pages 387-401
Fuzzy Approach for Image Near-Duplicate Detection Using Gray Level Vertex Matching in Attribute Relational Bipartite Graphs....Pages 402-414
Formal Modeling of Mobile Middleware for Tuple Space Coordination over Multiple Heterogeneous Networks....Pages 415-430
Simplified Control Algorithm Based on IRP Theory for Three Phase Shunt Active Power Filter....Pages 431-440
Real Time Object Tracking: Simulation and Implementation on FPGA Based Soft Processor....Pages 441-450
Reduced Complexity Pseudo-fractional Adaptive Algorithm with Variable Tap-Length Selection....Pages 451-460
An Efficient and Secure Micro-payment Transaction Using Shell Cryptography....Pages 461-469
High Speed Reconfigurable FPGA Based Digital Filter....Pages 470-478
Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System....Pages 479-484
NTTM: Novel Transmission Time Based Mechanism to Detect Wormhole Attack....Pages 485-495
A Privacy Preserving Representation for Web Service Communicators’ in the Cloud....Pages 496-506
Detailed Dominant Approach Cloud Computing Integration with WSN....Pages 507-516
Secret Image Sharing Scheme Based on Pixel Replacement....Pages 517-526
An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration....Pages 527-542
Threats and Challenges to Security of Electronic Health Records....Pages 543-559
On Second-Order Nonlinearities of Two Classes of Cubic Boolean Functions....Pages 560-567
A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System....Pages 568-577
GAS: A Novel Grid Based Authentication System....Pages 578-590
Multiplicative Watermarking of Audio in Spectral Domain....Pages 591-605
A Comparative Analysis of Various Deployment Based DDoS Defense Schemes....Pages 606-616
Protecting PLM Data Throughout Their Lifecycle....Pages 617-632
Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID Applications....Pages 633-642
Performance Analysis of Cryptographic Acceleration in Multicore Environment....Pages 643-657
A Review on Wireless Network Security....Pages 658-667
Improved Proxy Signature Scheme without Bilinear Pairings....Pages 668-681
Enhanced Block Playfair Cipher....Pages 682-688
Ciphertext-Policy Attribute-Based Encryption with User Revocation Support....Pages 689-695
A Proposal for SMS Security Using NTRU Cryptosystem....Pages 696-705
Analysis and Improvement of an Authentication Scheme Using Smart Cards....Pages 706-718
A Review on Remote User Authentication Schemes Using Smart Cards....Pages 719-728
Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks....Pages 729-749
Image Secret Sharing in Stego-Images with Authentication....Pages 750-763
On Generalized Nega–Hadamard Transform....Pages 764-770
Design of High Performance MIPS Cryptography Processor....Pages 771-777
Design of an Edge Detection Based Image Steganography with High Embedding Capacity....Pages 778-793
Trust Management Method for Vehicular Ad Hoc Networks....Pages 794-800
Feature and Future of Visual Cryptography Based Schemes....Pages 801-815
A Novel Framework for Users’ Accountability on Online Social Networks....Pages 816-830
Network Security Using ECC with Biometric....Pages 831-841
Hybrid Key Management Technique for WSN’s....Pages 842-853
DRMWSN-Detecting Replica Nodes Using Multiple Identities in Wireless Sensor Network....Pages 854-865
Security Improvement in Group Key Management....Pages 866-878
Detailed Dominant Approach Cloud Computing Integration with WSN....Pages 879-893
Secure Real Time Scheduling on Cluster with Energy Minimization....Pages 894-903
Wireless Sensor Node Placement Due to Power Loss Effects from Surrounding Vegetation....Pages 904-914
Increasing the Reliability of Fuzzy Angle Oriented Cluster Using Peer-to-Peer....Pages 915-927
Extended Ant Colony Optimization Algorithm (EACO) for Efficient Design of Networks and Improved Reliability....Pages 928-938
Evaluation of Understandability of Object-Oriented Design....Pages 939-950
Safety Analysis of Automatic Door Operation for Metro Train: A Case Study....Pages 951-961
A Generalized Model for Internet-Based Access Control Systems with Delegation Support....Pages 962-974
QoS Support Downlink for WiMAX Network....Pages 975-988
A Framework of Service Selection and Composition for Flexible Network Architecture....Pages 989-997
Back Matter....Pages 998-1007
....Pages -
Download the book Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen