Coverart for item
The Resource Proceedings of the International Conference on Computing and Communication Systems : I3CS 2016, NEHU, Shillong, India, J. K. Mandal, Goutam Saha, Debdatta Kandar, Arnab Kumar Maji, editors

Proceedings of the International Conference on Computing and Communication Systems : I3CS 2016, NEHU, Shillong, India, J. K. Mandal, Goutam Saha, Debdatta Kandar, Arnab Kumar Maji, editors

Label
Proceedings of the International Conference on Computing and Communication Systems : I3CS 2016, NEHU, Shillong, India
Title
Proceedings of the International Conference on Computing and Communication Systems
Title remainder
I3CS 2016, NEHU, Shillong, India
Statement of responsibility
J. K. Mandal, Goutam Saha, Debdatta Kandar, Arnab Kumar Maji, editors
Title variation
I3CS 2016
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
The volume contains latest research work presented at International Conference on Computing and Communication Systems (I3CS 2016) held at North Eastern Hill University (NEHU), Shillong, India. The book presents original research results, new ideas and practical development experiences which concentrate on both theory and practices. It includes papers from all areas of information technology, computer science, electronics and communication engineering written by researchers, scientists, engineers and scholar students and experts from India and abroad
Member of
Cataloging source
GW5XE
Dewey number
004.6
Index
no index present
LC call number
TK5105.5
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2016
http://bibfra.me/vocab/lite/meetingName
International Conference on Computing and Communication Systems
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorDate
1960-
http://library.link/vocab/relatedWorkOrContributorName
  • Mandal, Jyotsna Kumar
  • Saha, Goutam
  • Kandar, Debdatta
  • Maji, Arnab Kumar
Series statement
Lecture notes in networks and systems,
Series volume
volume 24
http://library.link/vocab/subjectName
  • Computer networks
  • Artificial intelligence
  • Engineering
  • Communications Engineering, Networks
  • Computational Intelligence
  • Data Mining and Knowledge Discovery
Label
Proceedings of the International Conference on Computing and Communication Systems : I3CS 2016, NEHU, Shillong, India, J. K. Mandal, Goutam Saha, Debdatta Kandar, Arnab Kumar Maji, editors
Instantiates
Publication
Antecedent source
unknown
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Organizing Committee; Acknowledgements; Contents; About the Editors; Network Technologies; 1 Effective Verification Scheme for Filtering Injected False Data in Wireless Sensor Networks; Abstract; Introduction; Related Works; System Models and Assumptions; System Model; Threat Model; Scenario; Proposed System; Sensor Node Deployment; Shortest Path Estimation; Report Generation; Conclusion and Future Work; References; 2 ISCP: Inter State Changing Problem in Wireless Sensor Network with Dumb-Behaving Nodes; Introduction; Contributions; Sensor Nodes States
  • Description of the ProblemsRAD: Recovery Attempt of Dead Nodes; IRA: Insecure Recovery Attempt; DB: Data Burst; Solution Guideline; Performance Evaluation; Simulation Setup; Conclusion; References; 3 Effects of Persistent Misbehaving Nodes in Wireless Sensor Networks; Introduction; Difference Between Temporary and Persistent Misbehavior; Performance Evaluation; Simulation Setup; Conclusion; References; 4 Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks; Introduction; Background Details; Related Work; Routing Protocol in MANETs; Reactive Routing Protocol
  • Proactive Routing ProtocolHybrid Routing Protocols; Other Routing Protocols; Performance Evaluation; Simulation Setup and Parameters; Simulation Results; Conclusion; References; 5 Secure Adhoc On-Demand Multipath Distance Vector Routing in MANET; Abstract; Introduction; Security Needs in Routing Protocols; Identification of Problem; Proposed Methodology; Detection of Attacks by Using Intrusion Detecting System (IDS); Routing Activity of Trusted Secure AOMDV; Implementing TS-AOMDV; Blackhole and Grayhole Attack Detection; Detection of Flooding Attacks; Conclusion; References
  • 6 Reputation-Based Trust for Selection of Trustworthy Cloud Service ProvidersIntroduction; Literature Review; Proposed Framework; Cloud Registry and Discovery; Credibility Checker; Reputation Calculator; Trust Calculator; Recommender; Experimental Results; Dataset Used; Results; Conclusion; References; 7 Global Common Sequence Alignment Using Dynamic Window Algorithm; Abstract; Introduction; DNA Sequencing and Alignment; Proposed Method; Result and Discussion; Conclusion; References; Artificial Intelligence and Soft Computing
  • 8 Generic Document Classification Using Clustering, Centrality, and VotingAbstract; Introduction; Related Work; Methodology; Result; Conclusion and Future Work; References; 9 A Game for Shared Ontology Evolution; Introduction; Background; Ontology for Domain Representation; Game Theory; Proposed Framework for Evolution of Shared Ontology; Motivation; Modeling Ontology Evolution as a Game; Simulation Setup and Results; Conclusion and Future Directions; References; 10 An Adaptive Genetic Algorithm Based Neural Network for Traversability Analysis Under Uncertain Terrain Conditions; Abstract
Control code
SPR1030309464
Dimensions
unknown
Extent
1 online resource (xxii, 857 pages)
File format
unknown
Form of item
online
Isbn
9789811068904
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-981-10-6890-4
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
  • on1030309464
  • (OCoLC)1030309464
Label
Proceedings of the International Conference on Computing and Communication Systems : I3CS 2016, NEHU, Shillong, India, J. K. Mandal, Goutam Saha, Debdatta Kandar, Arnab Kumar Maji, editors
Publication
Antecedent source
unknown
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Organizing Committee; Acknowledgements; Contents; About the Editors; Network Technologies; 1 Effective Verification Scheme for Filtering Injected False Data in Wireless Sensor Networks; Abstract; Introduction; Related Works; System Models and Assumptions; System Model; Threat Model; Scenario; Proposed System; Sensor Node Deployment; Shortest Path Estimation; Report Generation; Conclusion and Future Work; References; 2 ISCP: Inter State Changing Problem in Wireless Sensor Network with Dumb-Behaving Nodes; Introduction; Contributions; Sensor Nodes States
  • Description of the ProblemsRAD: Recovery Attempt of Dead Nodes; IRA: Insecure Recovery Attempt; DB: Data Burst; Solution Guideline; Performance Evaluation; Simulation Setup; Conclusion; References; 3 Effects of Persistent Misbehaving Nodes in Wireless Sensor Networks; Introduction; Difference Between Temporary and Persistent Misbehavior; Performance Evaluation; Simulation Setup; Conclusion; References; 4 Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks; Introduction; Background Details; Related Work; Routing Protocol in MANETs; Reactive Routing Protocol
  • Proactive Routing ProtocolHybrid Routing Protocols; Other Routing Protocols; Performance Evaluation; Simulation Setup and Parameters; Simulation Results; Conclusion; References; 5 Secure Adhoc On-Demand Multipath Distance Vector Routing in MANET; Abstract; Introduction; Security Needs in Routing Protocols; Identification of Problem; Proposed Methodology; Detection of Attacks by Using Intrusion Detecting System (IDS); Routing Activity of Trusted Secure AOMDV; Implementing TS-AOMDV; Blackhole and Grayhole Attack Detection; Detection of Flooding Attacks; Conclusion; References
  • 6 Reputation-Based Trust for Selection of Trustworthy Cloud Service ProvidersIntroduction; Literature Review; Proposed Framework; Cloud Registry and Discovery; Credibility Checker; Reputation Calculator; Trust Calculator; Recommender; Experimental Results; Dataset Used; Results; Conclusion; References; 7 Global Common Sequence Alignment Using Dynamic Window Algorithm; Abstract; Introduction; DNA Sequencing and Alignment; Proposed Method; Result and Discussion; Conclusion; References; Artificial Intelligence and Soft Computing
  • 8 Generic Document Classification Using Clustering, Centrality, and VotingAbstract; Introduction; Related Work; Methodology; Result; Conclusion and Future Work; References; 9 A Game for Shared Ontology Evolution; Introduction; Background; Ontology for Domain Representation; Game Theory; Proposed Framework for Evolution of Shared Ontology; Motivation; Modeling Ontology Evolution as a Game; Simulation Setup and Results; Conclusion and Future Directions; References; 10 An Adaptive Genetic Algorithm Based Neural Network for Traversability Analysis Under Uncertain Terrain Conditions; Abstract
Control code
SPR1030309464
Dimensions
unknown
Extent
1 online resource (xxii, 857 pages)
File format
unknown
Form of item
online
Isbn
9789811068904
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-981-10-6890-4
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
  • on1030309464
  • (OCoLC)1030309464

Library Locations

Processing Feedback ...