Intro; Preface; Organizing Committee; Acknowledgements; Contents; About the Editors; Network Technologies; 1 Effective Verification Scheme for Filtering Injected False Data in Wireless Sensor Networks; Abstract; Introduction; Related Works; System Models and Assumptions; System Model; Threat Model; Scenario; Proposed System; Sensor Node Deployment; Shortest Path Estimation; Report Generation; Conclusion and Future Work; References; 2 ISCP: Inter State Changing Problem in Wireless Sensor Network with Dumb-Behaving Nodes; Introduction; Contributions; Sensor Nodes States.
متن يادداشت
6 Reputation-Based Trust for Selection of Trustworthy Cloud Service ProvidersIntroduction; Literature Review; Proposed Framework; Cloud Registry and Discovery; Credibility Checker; Reputation Calculator; Trust Calculator; Recommender; Experimental Results; Dataset Used; Results; Conclusion; References; 7 Global Common Sequence Alignment Using Dynamic Window Algorithm; Abstract; Introduction; DNA Sequencing and Alignment; Proposed Method; Result and Discussion; Conclusion; References; Artificial Intelligence and Soft Computing.
متن يادداشت
8 Generic Document Classification Using Clustering, Centrality, and VotingAbstract; Introduction; Related Work; Methodology; Result; Conclusion and Future Work; References; 9 A Game for Shared Ontology Evolution; Introduction; Background; Ontology for Domain Representation; Game Theory; Proposed Framework for Evolution of Shared Ontology; Motivation; Modeling Ontology Evolution as a Game; Simulation Setup and Results; Conclusion and Future Directions; References; 10 An Adaptive Genetic Algorithm Based Neural Network for Traversability Analysis Under Uncertain Terrain Conditions; Abstract.
متن يادداشت
Description of the ProblemsRAD: Recovery Attempt of Dead Nodes; IRA: Insecure Recovery Attempt; DB: Data Burst; Solution Guideline; Performance Evaluation; Simulation Setup; Conclusion; References; 3 Effects of Persistent Misbehaving Nodes in Wireless Sensor Networks; Introduction; Difference Between Temporary and Persistent Misbehavior; Performance Evaluation; Simulation Setup; Conclusion; References; 4 Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks; Introduction; Background Details; Related Work; Routing Protocol in MANETs; Reactive Routing Protocol.
متن يادداشت
Proactive Routing ProtocolHybrid Routing Protocols; Other Routing Protocols; Performance Evaluation; Simulation Setup and Parameters; Simulation Results; Conclusion; References; 5 Secure Adhoc On-Demand Multipath Distance Vector Routing in MANET; Abstract; Introduction; Security Needs in Routing Protocols; Identification of Problem; Proposed Methodology; Detection of Attacks by Using Intrusion Detecting System (IDS); Routing Activity of Trusted Secure AOMDV; Implementing TS-AOMDV; Blackhole and Grayhole Attack Detection; Detection of Flooding Attacks; Conclusion; References.
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
The volume contains latest research work presented at International Conference on Computing and Communication Systems (I3CS 2016) held at North Eastern Hill University (NEHU), Shillong, India. The book presents original research results, new ideas and practical development experiences which concentrate on both theory and practices. It includes papers from all areas of information technology, computer science, electronics and communication engineering written by researchers, scientists, engineers and scholar students and experts from India and abroad.
یادداشتهای مربوط به سفارشات
منبع سفارش / آدرس اشتراک
Springer Nature
شماره انبار
com.springer.onix.9789811068904
ویراست دیگر از اثر در قالب دیگر رسانه
شماره استاندارد بين المللي کتاب و موسيقي
9789811068898
عنوان اصلی به زبان دیگر
عنوان اصلي به زبان ديگر
I3CS 2016
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Artificial intelligence, Congresses.
موضوع مستند نشده
Computer networks, Congresses.
موضوع مستند نشده
Artificial intelligence.
موضوع مستند نشده
Computer networks.
موضوع مستند نشده
COMPUTERS-- Computer Literacy.
موضوع مستند نشده
COMPUTERS-- Computer Science.
موضوع مستند نشده
COMPUTERS-- Data Processing.
موضوع مستند نشده
COMPUTERS-- Hardware-- General.
موضوع مستند نشده
COMPUTERS-- Information Technology.
موضوع مستند نشده
COMPUTERS-- Machine Theory.
موضوع مستند نشده
COMPUTERS-- Reference.
مقوله موضوعی
موضوع مستند نشده
COM-- 013000
موضوع مستند نشده
COM-- 014000
موضوع مستند نشده
COM-- 018000
موضوع مستند نشده
COM-- 032000
موضوع مستند نشده
COM-- 037000
موضوع مستند نشده
COM-- 052000
موضوع مستند نشده
COM-- 067000
موضوع مستند نشده
TEC041000
موضوع مستند نشده
TJK
موضوع مستند نشده
TJK
رده بندی ديویی
شماره
004
.
6
ويراست
23
رده بندی کنگره
شماره رده
TK5105
.
5
نام شخص - (مسئولیت معنوی برابر )
مستند نام اشخاص تاييد نشده
Kandar, Debdatta
مستند نام اشخاص تاييد نشده
Maji, Arnab Kumar
مستند نام اشخاص تاييد نشده
Mandal, Jyotsna Kumar,1960-
مستند نام اشخاص تاييد نشده
Saha, Goutam
نام تنالگان به منزله سر شناسه - (مسئولیت معنوی درجه اول )
مستند نام تنالگان تاييد نشده
International Conference on Computing and Communication Systems(2nd :2016 :, Shillong, India)