Advances in computer science and information technology [electronic resource] : Networks and Communications : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings. Part I / edited by Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai.

The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andse...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: International Conference on Computer Science and Information Technology (2011- ) Bangalore, India)
Other Authors: Meghanathan, Natarajan, 1977-, Chaki, Nabendu, Nagamalai, Dhinaharan
Other title:CCSIT 2012.
Format: Electronic Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer, ©2012.
Series:Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ; 84.
Subjects:

MARC

LEADER 00000cam a2200000xa 4500
001 b7110828
006 m o d
007 cr |||||||||||
008 120503s2012 gw ob 101 0 eng d
005 20240418144309.3
019 |a 828642049  |a 1005804591  |a 1065132241  |a 1066447649 
020 |a 9783642272998  |q (electronic bk.) 
020 |a 3642272991  |q (electronic bk.) 
020 |a 3642272983 
020 |a 9783642272981 
020 |z 9783642272981 
024 7 |a 10.1007/978-3-642-27299-8 
035 |a (OCoLC)spr793002488 
035 |a (OCoLC)793002488  |z (OCoLC)828642049  |z (OCoLC)1005804591  |z (OCoLC)1065132241  |z (OCoLC)1066447649 
037 |a spr978-3-642-27299-8 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d COO  |d ZMC  |d OCLCQ  |d E7B  |d OCLCF  |d BEDGE  |d DKDLA  |d OCLCO  |d ICW  |d YDXCP  |d SINTU  |d MEAUC  |d OCL  |d OCLCO  |d OCLCQ  |d OCLCO  |d EBLCP  |d OCLCQ  |d Z5A  |d ESU  |d OCLCQ  |d VT2  |d IOG  |d NJR  |d CEF  |d U3W  |d WYU  |d YOU  |d TKN  |d LEAUB  |d OL$  |d OCLCQ  |d AJS  |d OCLCQ  |d OCLCO 
049 |a GWRE 
050 4 |a QA75.5  |b .I58 2012 
111 2 |a International Conference on Computer Science and Information Technology (2011- )  |n (2nd :  |d 2012 :  |c Bangalore, India) 
245 1 0 |a Advances in computer science and information technology  |h [electronic resource] :  |b Networks and Communications : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings.  |n Part I /  |c edited by Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai. 
246 3 |a CCSIT 2012. 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2012. 
300 |a 1 online resource (xxix, 645 pages) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file. 
347 |b PDF. 
490 1 |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,  |x 1867-8211 ;  |v 84. 
504 |a Includes bibliographical references and author index. 
505 0 0 |g Part 1.  |t Networks and Communications --  |t Adaptive Quorum Based MAC Protocol in Non Uniform Node Distribution of Wireless Sensor Networks /  |r L. Sherly Puspha Annabel and K. Murugan --  |t Mobile Agent in InVANET -- Traffic Management /  |r V. Arun and K.L. Shunmuganathan --  |t The Design of Observers for Nonlinear Control Systems around Equilibria /  |r Sundarapandian Vaidyanathan --  |t A Node Stability Index-Based Connected Dominating Set Algorithm for Mobile Ad Hoc Networks /  |r Natarajan Meghanathan --  |t Energy Efficient Dynamic Routing Protocol for Wireless Sensor Networks /  |r Md Golam Murshed and Alastair R. Allen --  |t Generalized Projective Synchronization of Hyperchaotic Lü and Hyperchaotic Cai Systems via Active Control /  |r Sarasu Pakiriswamy and Sundarapandian Vaidyanathan --  |t Energy Efficient Stable Connected Dominating Set Construction in Mobile Ad Hoc Networks /  |r R. Ramalakshmi and S. Radhakrishnan --  |t Hybrid Synchronization of Arneodo and Rössler Chaotic Systems by Active Nonlinear Control /  |r Sundarapandian Vaidyanathan and Suresh Rasappan --  |t Realization of SDR in Partial Reconfigurable FPGA Using Different Types of Modulation Techniques /  |r Neenu Joseph and P. Nirmal Kumar --  |t A Recommender System for Sweaty Sock Syndrome /  |r L. Arockiam, S. Charles, C. Lalitha and I. Carol --  |t Enhanced AODV Routing Protocol for Wireless Sensor Network Based on ZigBee /  |r Dilip Kumar Ahirwar, Prashant Verma and Jitendra Daksh --  |t Sliding Mode Controller Design for the Global Chaos Synchronization of Coullet Systems /  |r Sundarapandian Vaidyanathan and Sivaperumal Sampath. 
505 0 0 |t Geralized Projective Synchronization of Double-Scroll Chaotic Systems Using Active Feedback Control /  |r Sundarapandian Vaidyanathan and Sarasu Pakiriswamy --  |t Mobile Ad Hoc Networks Security Attacks and Secured Routing Protocols: A Survey /  |r Supriya and Manju Khari --  |t Privacy and Security in Digital Networks from the Perspective of Modeling and Software Development /  |r Erich Ortner --  |t A Logical Topology to Find Alternate Routes in WDM Lightwave Network /  |r Santosh Das and Abhijit Makhal --  |t A Novel Approach for MIMO OFDM Systems to Estimate I/Q Imbalance, CFO, Channel Response Using Training Sequences /  |r J. Tarun Kumar and K. Anitha Sheela --  |t A Trust Based Routing Scheme for Wireless Sensor Networks /  |r Aveek Chakrabarti, Vishal Parekh and Atin Ruia --  |t Survey of Trust Schemes on Ad-Hoc Network /  |r Renu Dalal, Manju Khari and Yudhvir Singh --  |t Improve Service Discovery Performance over Different Networks Utilization and Sizes /  |r Intisar Al-Mejibli, Martin Colley and Salah Al-Majeed --  |t Adaptive K-Means Clustering to Handle Heterogeneous Data Using Basic Rough Set Theory /  |r B.K. Tripathy, Adhir Ghosh and G.K. Panda --  |t Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata /  |r Himadri Nath Saha, Debika Bhattachayya and P.K. Banerjee --  |t A Location Dependent Semantic Cache Replacement Strategy in Mobile Environment /  |r Kahkashan Tabassum, Mahmood Quadri Syed and A. Damodaram --  |t Connectivity of Autonomous Agents Using Ad-Hoc Mobile Router Networks /  |r Emi Mathews and Ciby Mathew --  |t A New Approach to Stegnography /  |r Soumik Mukherjee, Moumita Deb, Pratik Kumar Agarwal and Abhinava Roy --  |t Survey on Key Pre Distribution for Security in Wireless Sensor Networks /  |r T.P. Rani and C. Jaya Kumar. 
505 0 0 |g Part 2.  |t Wireless and Mobile Networks --  |t A Link Distance Ratio Based Stable Multicast Routing Protocol for Mobile Ad Hoc Networks /  |r Natarajan Meghanathan --  |t A New Security Solution Architecture (SSA) for MANETS against Network Layer Attacks /  |r G.S. Mamatha --  |t Analysis of Different Associative Memory Neural Network for GPS/INS Data Fusion /  |r S. Angel Deborah --  |t Handover Latency Measurement of Mobile IPv6 in a Testbed Environment /  |r Muhammad Arif Amin, Kamalrulnizam Bin Abu Bakar, Abdul Hanan Abdullah, Mahesh Nair and Rashid Hafeez Khokhar --  |t Different Strategy for Data Management in Mobile Computing /  |r Chandrani Chakravorty and J. Usha --  |t Generic Network Visualization Tool for Monitoring Adhoc Wireless Networks /  |r Girish Revadigar and Chitra Javali --  |t Adaptive MMSE Equalizer through LMS Algorithm Based CMA Channel Equalization /  |r R. Nirmala Devi, Tara Saikumar and K. Kishan Rao --  |t Weighted Angle Based Approach for Face Recognition /  |r M. Koteswara Rao, K. Veeraswamy, K. Anitha Sheela and B. Chandra Mohan --  |t Multiple Mobile Agents based Data Dissemination Protocol for Wireless Sensor Networks /  |r Govind P. Gupta, Manoj Misra and Kumkum Garg --  |t Enhanced Cluster Based Routing Protocol for MANETS /  |r Kartheek Srungaram and M.H.M. Krishna Prasad --  |t Soft Computing Technique Based Call Admission Control Decision Mechanism /  |r H.S. Ramesh Babu, Gowrishankar, G. Mahesh and P.S. Satyanarayana --  |t Mechanisms Supporting Mobility in WSNs /  |r Saimadhavi and Y.S. Kumarswamy. 
505 0 0 |t An Optimal RPC Based Approach to Increase Fault in Wireless Ad-Hoc Network /  |r Rabindra Kumar Shial, K. Hemant Ku. Reddy and K.L. Narayana --  |t Location Management and Resource Allocation Using Load Balancing in Wireless Heterogeneous Networks /  |r G. Adiline Macriga and V.S. Surya --  |t Cross Language Information Retrieval Approach in Peer-to-Peer Network /  |r M. Archana and K.A. Sumithra Devi --  |t Detecting and Avoiding Wormhole Attack in MANET Using Statistical Analysis Approach /  |r Saurabh Upadhyay and Brijesh Kumar Chaurasia --  |t Energy Efficient Hierarchical Clustering Routing Protocol for Wireless Sensor Networks /  |r Diwakar Meenakshi and Sushil Kumar --  |t An Analysis on Energy Efficient System Design in Grid Computing /  |r D. Ramesh and A. Krishnan --  |t Cluster-based Power Aware Scheduling (CPAS) Algorithm for Network Longevity in WSN /  |r K. Arthi and P. Vanaja Ranjan --  |t Development of System for GPS Data Transmission to Web Server for Online over Head Conductor Sag Measurement /  |r Sangeeta Kamboj and Ratna Dahiya --  |t A Comparative Study of Partitioning Algorithms for Wireless Sensor Networks /  |r Zeenat Rehena, Debasree Das, Sarbani Roy and Nandini Mukherjee --  |t Sensor-Cloud: Assimilation of Wireless Sensor Network and the Cloud /  |r Sanjit Kumar Dash, Jyoti Prakash Sahoo, Subasish Mohapatra and Sarada Prasanna Pati --  |t Game Theoretic Model for Selfish Node Avoidance in Ad Hoc Networks /  |r Upasana Dohare, D.K. Lobiyal and Sushil Kumar --  |t Performance Evaluation of VANET Using Realistic Vehicular Mobility /  |r Nidhi and D.K. Lobiyal --  |t Ensuring Data Confidentiality and Privacy in Mobile Ad Hoc Networks /  |r Hamza Aldabbas, Helge Janicke, Radwan AbuJassar and Tariq Alwada'n --  |t Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s) /  |r Dhyanendra Jain, Pallavi Khatri, Rishi Soni and Brijesh Kumar Chaurasia. 
505 0 0 |g Part 3.  |t Network Security --  |t Dependable Solutions Design by Agile Modeled Layered Security Architectures /  |r M. Upendra Kumar, D. Sravan Kumar, B. Padmaja Rani, K. Venkateswar Rao and A.V. Krishna Prasad, et al. --  |t Block Lanczos to Solve Integer Factorization Problem Using GPU's /  |r Harish Malla, Vilas SantKaustubh, Rajasekharan Ganesh and Padmavathy R. --  |t Lattice Based Tools for Cryptanalysis in Various Applications /  |r R. Santosh Kumar, C. Narasimham and S. Pallam Setty --  |t Securing the National Knowledge Network /  |r S.V. Nagaraj --  |t Pattern Based IDS Using Supervised, Semi-supervised and Unsupervised Approaches /  |r Vinod K. Pachghare, Vaibhav K. Khatavkar and Parag Kulkarni --  |t A Secure Session Transfer Protocol for Downloading a Large File across a Cluster of Servers in the Presence of Network Congestion /  |r Natarajan Meghanathan and Bhadrachalam Chitturi --  |t An Improved Anti Spam Filter Based on Content, Low Level Features and Noise /  |r Anand Gupta, Chhavi Singhal and Somya Aggarwal. 
505 0 0 |t Diameter Single Sign On -- Secure and Personalized Service Provision via Authentication and Authorization Mechanisms /  |r Robayet Nasim --  |t Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems /  |r K.G. Srinivasa --  |t A New Symmetric Key Cryptosystem Based on Feistel Network: Parallel Dependent Feistel Network (PDFN) /  |r Indrajit Das and R. Saravanan --  |t Survey of Shape Based Boundary Methods for Leaf Retrieval /  |r Komal Asrani, Renu Jain and Deepak Asrani --  |t Modified Chain Code Histogram Feature for Handwritten Character Recognition /  |r Jitendra Jain, Soyuj Kumar Sahoo, S.R. Mahadeva Prasanna and G. Siva Reddy --  |t A Novel Image Edge Detection Method Using Simplified Gabor Wavelet /  |r C. Sujatha and D. Selvathi --  |t Low Power Spatial Modulation Scheme for Wide Band Multiple Input and Multiple Output Wireless Communication Systems /  |r Dhirendra Kumar Tripathi, S. Saravanan and HarNarayan Upadhyay. 
520 8 |a The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson networks and communications; wireless and mobile networks; and network security. 
650 0 |a Computer science  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101220. 
650 0 |a Information technology  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008104441. 
650 7 |a Computer science.  |2 fast  |0 (OCoLC)fst00872451. 
650 7 |a Information technology.  |2 fast  |0 (OCoLC)fst00973089. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772. 
700 1 |a Meghanathan, Natarajan,  |d 1977-  |0 http://id.loc.gov/authorities/names/no2009203282  |1 http://isni.org/isni/0000000098608479. 
700 1 |a Chaki, Nabendu.  |0 http://id.loc.gov/authorities/names/no2011005177  |1 http://isni.org/isni/0000000114109507. 
700 1 |a Nagamalai, Dhinaharan.  |0 http://id.loc.gov/authorities/names/no2011005178  |1 http://isni.org/isni/0000000120360917. 
776 0 8 |i Printed edition:  |z 9783642272981. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-642-27299-8  |z Full Text (via Springer) 
830 0 |a Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;  |v 84.  |0 http://id.loc.gov/authorities/names/no2009128062. 
907 |a .b71108282  |b 04-01-21  |c 05-22-12 
915 |a - 
998 |a web  |b 03-31-21  |c b  |d b   |e -  |f eng  |g gw   |h 0  |i 1 
907 |a .b71108282  |b 03-31-21  |c 05-22-12 
944 |a MARS - RDA ENRICHED 
956 |b Springer Nature - Springer Computer Science eBooks 2012 English International 
956 |a Springer e-books 
956 |b Springer Nature - Springer Computer Science eBooks 2012 English International 
999 f f |i 19c1d060-c5b9-57d6-a4c2-cb66e46661e2  |s 050e8bc6-7320-51be-ae78-34ec04750318 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA75.5 .I58 2012  |h Library of Congress classification  |i Ebooks, Prospector  |n 1