Linked e-resources
Details
Table of Contents
Intro; Preface; Organizing Committee; Acknowledgements; Contents; About the Editors; Network Technologies; 1 Effective Verification Scheme for Filtering Injected False Data in Wireless Sensor Networks; Abstract; Introduction; Related Works; System Models and Assumptions; System Model; Threat Model; Scenario; Proposed System; Sensor Node Deployment; Shortest Path Estimation; Report Generation; Conclusion and Future Work; References; 2 ISCP: Inter State Changing Problem in Wireless Sensor Network with Dumb-Behaving Nodes; Introduction; Contributions; Sensor Nodes States
Description of the ProblemsRAD: Recovery Attempt of Dead Nodes; IRA: Insecure Recovery Attempt; DB: Data Burst; Solution Guideline; Performance Evaluation; Simulation Setup; Conclusion; References; 3 Effects of Persistent Misbehaving Nodes in Wireless Sensor Networks; Introduction; Difference Between Temporary and Persistent Misbehavior; Performance Evaluation; Simulation Setup; Conclusion; References; 4 Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks; Introduction; Background Details; Related Work; Routing Protocol in MANETs; Reactive Routing Protocol
Proactive Routing ProtocolHybrid Routing Protocols; Other Routing Protocols; Performance Evaluation; Simulation Setup and Parameters; Simulation Results; Conclusion; References; 5 Secure Adhoc On-Demand Multipath Distance Vector Routing in MANET; Abstract; Introduction; Security Needs in Routing Protocols; Identification of Problem; Proposed Methodology; Detection of Attacks by Using Intrusion Detecting System (IDS); Routing Activity of Trusted Secure AOMDV; Implementing TS-AOMDV; Blackhole and Grayhole Attack Detection; Detection of Flooding Attacks; Conclusion; References
6 Reputation-Based Trust for Selection of Trustworthy Cloud Service ProvidersIntroduction; Literature Review; Proposed Framework; Cloud Registry and Discovery; Credibility Checker; Reputation Calculator; Trust Calculator; Recommender; Experimental Results; Dataset Used; Results; Conclusion; References; 7 Global Common Sequence Alignment Using Dynamic Window Algorithm; Abstract; Introduction; DNA Sequencing and Alignment; Proposed Method; Result and Discussion; Conclusion; References; Artificial Intelligence and Soft Computing
8 Generic Document Classification Using Clustering, Centrality, and VotingAbstract; Introduction; Related Work; Methodology; Result; Conclusion and Future Work; References; 9 A Game for Shared Ontology Evolution; Introduction; Background; Ontology for Domain Representation; Game Theory; Proposed Framework for Evolution of Shared Ontology; Motivation; Modeling Ontology Evolution as a Game; Simulation Setup and Results; Conclusion and Future Directions; References; 10 An Adaptive Genetic Algorithm Based Neural Network for Traversability Analysis Under Uncertain Terrain Conditions; Abstract
Description of the ProblemsRAD: Recovery Attempt of Dead Nodes; IRA: Insecure Recovery Attempt; DB: Data Burst; Solution Guideline; Performance Evaluation; Simulation Setup; Conclusion; References; 3 Effects of Persistent Misbehaving Nodes in Wireless Sensor Networks; Introduction; Difference Between Temporary and Persistent Misbehavior; Performance Evaluation; Simulation Setup; Conclusion; References; 4 Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks; Introduction; Background Details; Related Work; Routing Protocol in MANETs; Reactive Routing Protocol
Proactive Routing ProtocolHybrid Routing Protocols; Other Routing Protocols; Performance Evaluation; Simulation Setup and Parameters; Simulation Results; Conclusion; References; 5 Secure Adhoc On-Demand Multipath Distance Vector Routing in MANET; Abstract; Introduction; Security Needs in Routing Protocols; Identification of Problem; Proposed Methodology; Detection of Attacks by Using Intrusion Detecting System (IDS); Routing Activity of Trusted Secure AOMDV; Implementing TS-AOMDV; Blackhole and Grayhole Attack Detection; Detection of Flooding Attacks; Conclusion; References
6 Reputation-Based Trust for Selection of Trustworthy Cloud Service ProvidersIntroduction; Literature Review; Proposed Framework; Cloud Registry and Discovery; Credibility Checker; Reputation Calculator; Trust Calculator; Recommender; Experimental Results; Dataset Used; Results; Conclusion; References; 7 Global Common Sequence Alignment Using Dynamic Window Algorithm; Abstract; Introduction; DNA Sequencing and Alignment; Proposed Method; Result and Discussion; Conclusion; References; Artificial Intelligence and Soft Computing
8 Generic Document Classification Using Clustering, Centrality, and VotingAbstract; Introduction; Related Work; Methodology; Result; Conclusion and Future Work; References; 9 A Game for Shared Ontology Evolution; Introduction; Background; Ontology for Domain Representation; Game Theory; Proposed Framework for Evolution of Shared Ontology; Motivation; Modeling Ontology Evolution as a Game; Simulation Setup and Results; Conclusion and Future Directions; References; 10 An Adaptive Genetic Algorithm Based Neural Network for Traversability Analysis Under Uncertain Terrain Conditions; Abstract