Suchen und Finden
Preface
6
Technical Program Committee
8
About the Book
14
Contents
15
About the Editors
18
Advanced Communication Networks
20
1 Detection and Prevention of DDoS Attacks in Wireless Sensor Networks
21
Abstract
21
1 Introduction
21
2 Related Work
22
3 Proposed Model
23
3.1 Two Way Authentication
24
3.2 Data Filtration Method
24
3.3 Algorithm Steps
25
4 Implementation Using NS-2
25
5 Result Analysis
27
6 Conclusion
30
References
30
2 Wired LAN and Wireless LAN Attack Detection Using Signature Based and Machine Learning Tools
32
Abstract
32
1 Introduction
32
2 Related Work
33
3 Proposed Approach
34
4 Setup Environment of Lab
35
5 Results and Observations
36
5.1 Manually Through Wireshark
37
5.2 Using Signature Based Tool
38
5.3 Using Machine Learning Tool
38
6 Conclusion and Future Work
40
References
41
3 Enhancing WSN Lifetime Using TLH: A Routing Scheme
42
Abstract
42
1 Introduction
42
2 Literature Survey
43
3 Problem Statement
44
4 Proposed Work
45
4.1 Two Level Heterogeneity (TLH) Scheme
45
4.2 Sensor Radio Model
46
4.3 Workflow of Simulation
47
5 Simulation Study
48
5.1 Network Set Up
48
5.2 Simulation Environment
48
6 Result and Discussion
49
6.1 Advantages of Proposed Scheme with Flat Routing Heterogeneous Model
50
7 Conclusion
51
8 Future Scope
51
References
52
4 IP Traceback Schemes for DDoS Attack
53
Abstract
53
1 Introduction
53
2 Background Details & Related Work
54
3 IP Traceback Schemes
54
3.1 Reactive Mechanism Based Traceback Schemes: This Section Shows the Different Reactive Mechanism Based Traceback Schemes
57
3.1.1 Link Testing
57
3.1.2 Messaging
58
3.1.3 Packet Marking
58
3.1.4 Packet Logging
60
3.1.5 Overlay
61
3.2 Hybrid Traceback Schemes
61
3.3 Special IP Traceback Schemes
62
3.3.1 Ant Colony System Algorithm for Solving the IP Trace-Back Problem
64
4 Comparison of Different Proposed IP Traceback Schemes
64
5 Conclusions and Future Direction
65
References
66
5 Adaptability of Various Mobility Models for Flying AdHoc Networks—A Review
67
Abstract
67
1 Introduction
67
2 Mobility Models
68
2.1 Temporal Dependency
69
2.1.1 Gauss-Markov
69
2.1.2 Smooth Random
70
2.2 Spatial Dependency
70
2.2.1 Reference Point Group Mobility Model (RPGM)
71
2.2.2 Community Based Mobility Model
71
2.2.3 Pursue Mobility Model
71
2.2.4 Social Network Founded Model
71
2.3 Geographical Restrictions
72
2.3.1 Area-Graph Based Model
72
2.3.2 Map Based Model
72
2.3.3 Manhattan Grid Model
72
2.3.4 Obstacle Model
72
2.4 Hybrid Structure
73
2.4.1 Free Way Mobility
73
2.4.2 Catastrophe-Scenario Model
73
2.4.3 User Oriented Meta Model
73
2.4.4 Disaster Area Model
73
2.5 Random
74
2.5.1 Random-Waypoint
74
2.5.2 Clustered Mobility
74
2.5.3 Random Walk
74
3 Connectivity Graph Metrics
74
3.1 Number of Link Changes
75
3.2 Link Duration
75
3.3 Link Availability
75
4 Conclusion and Future Scope
78
Acknowledgements
78
References
78
6 Reliable Packet Delivery in Vehicular Networks Using WAVE for Communication Among High Speed Vehicles
80
Abstract
80
1 Introduction
81
2 Packet Delivery in Vehicular Ad Hoc Networks
83
3 Performance Evaluation of Proposed Algorithm
84
4 Simulation Parameters and Results
87
5 Conclusion
90
References
90
7 Integration of IEC 61850 MMS and IEEE 802.22 for Smart Grid Communication
93
Abstract
93
1 Introduction
94
2 Smart Grid Communication
95
3 IEC 61850
96
4 IEEE 802.22 WARN
98
5 Integration of IEC 61850 MMS with IEEE 802.22
99
6 Communication Model
100
7 Conclusions
101
References
102
8 KRUSH-D Approach for the Solution to Node Mobility Issue in Underwater Sensor Network (UWSN)
103
Abstract
103
1 Introduction
104
2 Proposed Approach
104
3 Dry Run of Proposed Approach
106
4 Results
109
5 Conclusion and Future Work
112
References
112
9 NS2 Based Structured Network Attack Scrutiny in MANET
113
Abstract
113
1 Introduction
114
2 Routing and Protocols
114
2.1 Routing
115
3 Attacks on Routing and Protocols
116
3.1 Based on Secrecy and Authentication
117
3.2 Based on Integrity
118
3.3 Based on Availability: Denial of Service
120
4 Comparison of Attacks
120
5 Study of Simulations
121
6 Conclusion
124
References
124
10 EKMT-k-Means Clustering Algorithmic Solution for Low Energy Consumption for Wireless Sensor Networks Based on Minimum Mean Distance from Base Station
126
Abstract
126
1 Introduction
126
2 Related Work
127
3 Proposed k-Means Clustering Based Energy Efficient Protocol
128
4 Simulation Results
132
5 Conclusion
135
References
135
11 A Review of FIR Filter Designs
137
Abstract
137
1 Introduction
137
1.1 Filter
138
1.1.1 Need of Filtering
138
1.1.2 Digital and Analog Filtering
138
1.1.3 Finite Impulse Response (FIR) Filter
139
1.1.4 Design Parameters and Constraints
140
2 FIR Filter Design
140
2.1 Observations for FIR Filter
148
3 Conclusions
149
References
150
12 Analysis of Safety Applications in VANET for LTE Based Network
153
Abstract
153
1 Introduction
154
2 Analysis, Design and Related Works
155
3 Proposed Scheduler for VANET Based Safety Application
158
4 Simulation Explanation and Results
160
5 Conclusion
164
References
164
13 Broadcast Storm Problem—A Hidden Consequence of Content Distribution in Content Delivery Networks
167
Abstract
167
1 Introduction
168
2 Literature Survey
169
2.1 Content Distribution and Selection
169
2.2 Broadcast Storm Problem
170
2.3 Solutions to BSP
171
3 Comparative Analysis
173
3.1 Problem Formulation
173
3.2 Comparative Study
174
3.3 BSP in CDN
175
4 Conclusion
176
References
176
Artificial Intelligence and Evolutionary Algorithms
178
Attribute Reduction Method Using the Combination of Entropy and Fuzzy Entropy
179
1 Introduction
179
2 Priliminaries
181
2.1 Entropy Fuzzy Entropy
181
2.2 Nearest Neighbor
182
3 Proposed Method
182
4 Experimental Results
184
5 Conclusion
186
References
186
15 Evaluation of Factors Responsible for Road Accidents in India by Fuzzy AHP
188
Abstract
188
1 Introduction
188
2 Literature Review
189
3 Methodology
191
3.1 AHP and Fuzzy AHP Approach
191
4 Case Study
193
4.1 Problem Definition
193
5 Conclusion
196
References
196
16 Development of Knowledge Capsules for Custom-Tailored Dissemination of Knowledge of Seismic Data Interpretation
198
Abstract
198
1 Introduction
198
2 Related Work
199
3 Proposed Framework
201
4 Experimental Details
202
5 Conclusion
204
Acknowledgements
204
References
204
17 Design of Low Cost Blood Glucose Sensing System Using Diffused Reflectance Near-Infrared Light
206
Abstract
206
1 Introduction
207
2 Research Methodology
208
2.1 Light wavelength selection
209
2.2 In Vitro Prototype Design
210
2.3 In Vivo Prototype Design
211
2.3.1 Calibration Models for Estimation of the Blood Glucose
214
3 Experimental Results
218
3.1 In Vitro Experimentation
218
3.2 In Vivo Experimentation
220
4 Discussion
222
5 Conclusion
223
References
224
18 Hybrid Chunker for Gujarati Language
226
Abstract
226
1 Introduction
226
2 Earlier Relevant Work
227
3 Approach Used
228
4 Architecture of Proposed System
231
5 Experiments
232
6 Results
233
7 Conclusions
234
References
234
19 Sound Localization in 3-D Space Using Kalman Filter and Neural Network for Human like Robotics
236
Abstract
236
1 Introduction
236
1.1 Neurotransmission
237
1.2 Sound Localization
238
1.3 Types of Cues for Sound Localization
238
1.4 Localization Process
239
2 Related Work
240
3 Preliminaries
241
3.1 Coincidence Detectors
241
3.2 Kalman Filters
242
3.2.1 Prediction Step
242
3.2.2 Updation Step
243
4 Proposed System
245
5 Results and Discussion
248
5.1 Conclusion and Future Scope
251
References
251
20 Analysis of Stock Prices and Its Associated Volume of Social Network Activity
253
Abstract
253
1 Introduction
253
2 The Foundations of Social Network Analysis
254
2.1 Terminology
254
2.2 Structure of Social Networks
255
2.3 Network Evolution
255
2.4 Network Density
256
2.5 Network Performance
256
3 Literature Survey
256
3.1 Correlation Between Public Sentiment and Market Sentiment
257
3.2 Sentiment Analysis at the User Level
257
3.3 Logistical Regression Modeling
258
3.4 Disadvantage of Predictive Models
259
4 Volume of Twitter Activity
259
4.1 Procedure
260
5 Analysis
261
6 Mathematical Analysis
261
7 Conclusion
262
References
263
21 On Solutions to Capacitated Vehicle Routing Problem Using an Enhanced Ant Colony Optimization Technique
264
Abstract
264
1 Introduction
264
2 CVRP Formulation
265
3 Enhanced Ant Colony Optimization (ACO) Algorithm
266
4 Computational Results
267
5 Conclusion
272
References
272
22 Music Recommendation System with User-Based and Item-Based Collaborative Filtering Technique
274
Abstract
274
1 Introduction
274
2 Related Work
275
2.1 User-Item Rating Matrix
275
2.2 Collaborative Filtering (CF) Technique
276
2.2.1 User-Based CF
276
2.2.2 Item-Based CF
276
3 Proposed Algorithm
276
3.1 Similarity Measures
277
3.2 Normalization Techniques
277
3.3 Proposed Approach
278
3.3.1 Pre-processing of Data
278
3.3.2 Model Building
279
4 Results
280
4.1 Experimental Results
281
5 Conclusion and Future Scope
283
References
285
23 GLCM Feature Extraction for Insect Bites Pattern Recognition
286
Abstract
286
1 Introduction
287
2 Texture Analysis
287
3 GLCM
288
4 Extraction of Features from GLCM
289
5 Result
290
6 Conclusion and Future Work
291
References
292
24 A Novel Hybrid PSO-DA Algorithm for Global Numerical Optimization
294
Abstract
294
1 Introduction
295
2 Particle Swarm Optimization
295
3 Dragonfly Algorithm
296
4 The Hybrid PSO-DA Algorithm
298
5 Simulation Results for Unconstraint Test Benchmark Function
299
6 Overcurrent Relay Co-ordination with Common Configuration in Power System
300
7 Conclusions
303
Acknowledgements
303
References
304
25 Short-Term Electricity Price Forecasting Using Hybrid SARIMA and GJR-GARCH Model
306
Abstract
306
1 Introduction
307
2 The Proposed Approach
308
2.1 Wavelet Transform
308
2.2 SARIMA Model
310
2.3 GJR-GARCH Model
310
2.4 Hybrid SARIMA-GJR GARCH Model
311
3 Results and Discussion
312
4 Conclusion
316
References
316
Author Index
319
427613_1_En_26_Chapter_OnlinePDF.pdf
0
26 Erratum to: Design of Low Cost Blood Glucose Sensing System Using Diffused Reflectance Near-Infrared Light
318
Erratum to:Chapter “Design of Low Cost Blood Glucose Sensing System Using Diffused Reflectance Near-Infrared Light” in: G.M. Perez et al. (eds.), Networking Communication and Data Knowledge Engineering, Lecture Notes on Data Engineering and Communications Technologies 3, https://doi.org/10.1007/978-981-10-4585-1_17
318
Alle Preise verstehen sich inklusive der gesetzlichen MwSt.