Networking Communication and Data Knowledge Engineering - Volume 1

von: Gregorio Martinez Perez, Krishn K. Mishra, Shailesh Tiwari, Munesh C. Trivedi

Springer-Verlag, 2017

ISBN: 9789811045851 , 320 Seiten

Format: PDF, OL

Kopierschutz: Wasserzeichen

Windows PC,Mac OSX für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Online-Lesen für: Windows PC,Mac OSX,Linux

Preis: 149,79 EUR

Mehr zum Inhalt

Networking Communication and Data Knowledge Engineering - Volume 1


 

Preface

6

Technical Program Committee

8

About the Book

14

Contents

15

About the Editors

18

Advanced Communication Networks

20

1 Detection and Prevention of DDoS Attacks in Wireless Sensor Networks

21

Abstract

21

1 Introduction

21

2 Related Work

22

3 Proposed Model

23

3.1 Two Way Authentication

24

3.2 Data Filtration Method

24

3.3 Algorithm Steps

25

4 Implementation Using NS-2

25

5 Result Analysis

27

6 Conclusion

30

References

30

2 Wired LAN and Wireless LAN Attack Detection Using Signature Based and Machine Learning Tools

32

Abstract

32

1 Introduction

32

2 Related Work

33

3 Proposed Approach

34

4 Setup Environment of Lab

35

5 Results and Observations

36

5.1 Manually Through Wireshark

37

5.2 Using Signature Based Tool

38

5.3 Using Machine Learning Tool

38

6 Conclusion and Future Work

40

References

41

3 Enhancing WSN Lifetime Using TLH: A Routing Scheme

42

Abstract

42

1 Introduction

42

2 Literature Survey

43

3 Problem Statement

44

4 Proposed Work

45

4.1 Two Level Heterogeneity (TLH) Scheme

45

4.2 Sensor Radio Model

46

4.3 Workflow of Simulation

47

5 Simulation Study

48

5.1 Network Set Up

48

5.2 Simulation Environment

48

6 Result and Discussion

49

6.1 Advantages of Proposed Scheme with Flat Routing Heterogeneous Model

50

7 Conclusion

51

8 Future Scope

51

References

52

4 IP Traceback Schemes for DDoS Attack

53

Abstract

53

1 Introduction

53

2 Background Details & Related Work

54

3 IP Traceback Schemes

54

3.1 Reactive Mechanism Based Traceback Schemes: This Section Shows the Different Reactive Mechanism Based Traceback Schemes

57

3.1.1 Link Testing

57

3.1.2 Messaging

58

3.1.3 Packet Marking

58

3.1.4 Packet Logging

60

3.1.5 Overlay

61

3.2 Hybrid Traceback Schemes

61

3.3 Special IP Traceback Schemes

62

3.3.1 Ant Colony System Algorithm for Solving the IP Trace-Back Problem

64

4 Comparison of Different Proposed IP Traceback Schemes

64

5 Conclusions and Future Direction

65

References

66

5 Adaptability of Various Mobility Models for Flying AdHoc Networks—A Review

67

Abstract

67

1 Introduction

67

2 Mobility Models

68

2.1 Temporal Dependency

69

2.1.1 Gauss-Markov

69

2.1.2 Smooth Random

70

2.2 Spatial Dependency

70

2.2.1 Reference Point Group Mobility Model (RPGM)

71

2.2.2 Community Based Mobility Model

71

2.2.3 Pursue Mobility Model

71

2.2.4 Social Network Founded Model

71

2.3 Geographical Restrictions

72

2.3.1 Area-Graph Based Model

72

2.3.2 Map Based Model

72

2.3.3 Manhattan Grid Model

72

2.3.4 Obstacle Model

72

2.4 Hybrid Structure

73

2.4.1 Free Way Mobility

73

2.4.2 Catastrophe-Scenario Model

73

2.4.3 User Oriented Meta Model

73

2.4.4 Disaster Area Model

73

2.5 Random

74

2.5.1 Random-Waypoint

74

2.5.2 Clustered Mobility

74

2.5.3 Random Walk

74

3 Connectivity Graph Metrics

74

3.1 Number of Link Changes

75

3.2 Link Duration

75

3.3 Link Availability

75

4 Conclusion and Future Scope

78

Acknowledgements

78

References

78

6 Reliable Packet Delivery in Vehicular Networks Using WAVE for Communication Among High Speed Vehicles

80

Abstract

80

1 Introduction

81

2 Packet Delivery in Vehicular Ad Hoc Networks

83

3 Performance Evaluation of Proposed Algorithm

84

4 Simulation Parameters and Results

87

5 Conclusion

90

References

90

7 Integration of IEC 61850 MMS and IEEE 802.22 for Smart Grid Communication

93

Abstract

93

1 Introduction

94

2 Smart Grid Communication

95

3 IEC 61850

96

4 IEEE 802.22 WARN

98

5 Integration of IEC 61850 MMS with IEEE 802.22

99

6 Communication Model

100

7 Conclusions

101

References

102

8 KRUSH-D Approach for the Solution to Node Mobility Issue in Underwater Sensor Network (UWSN)

103

Abstract

103

1 Introduction

104

2 Proposed Approach

104

3 Dry Run of Proposed Approach

106

4 Results

109

5 Conclusion and Future Work

112

References

112

9 NS2 Based Structured Network Attack Scrutiny in MANET

113

Abstract

113

1 Introduction

114

2 Routing and Protocols

114

2.1 Routing

115

3 Attacks on Routing and Protocols

116

3.1 Based on Secrecy and Authentication

117

3.2 Based on Integrity

118

3.3 Based on Availability: Denial of Service

120

4 Comparison of Attacks

120

5 Study of Simulations

121

6 Conclusion

124

References

124

10 EKMT-k-Means Clustering Algorithmic Solution for Low Energy Consumption for Wireless Sensor Networks Based on Minimum Mean Distance from Base Station

126

Abstract

126

1 Introduction

126

2 Related Work

127

3 Proposed k-Means Clustering Based Energy Efficient Protocol

128

4 Simulation Results

132

5 Conclusion

135

References

135

11 A Review of FIR Filter Designs

137

Abstract

137

1 Introduction

137

1.1 Filter

138

1.1.1 Need of Filtering

138

1.1.2 Digital and Analog Filtering

138

1.1.3 Finite Impulse Response (FIR) Filter

139

1.1.4 Design Parameters and Constraints

140

2 FIR Filter Design

140

2.1 Observations for FIR Filter

148

3 Conclusions

149

References

150

12 Analysis of Safety Applications in VANET for LTE Based Network

153

Abstract

153

1 Introduction

154

2 Analysis, Design and Related Works

155

3 Proposed Scheduler for VANET Based Safety Application

158

4 Simulation Explanation and Results

160

5 Conclusion

164

References

164

13 Broadcast Storm Problem—A Hidden Consequence of Content Distribution in Content Delivery Networks

167

Abstract

167

1 Introduction

168

2 Literature Survey

169

2.1 Content Distribution and Selection

169

2.2 Broadcast Storm Problem

170

2.3 Solutions to BSP

171

3 Comparative Analysis

173

3.1 Problem Formulation

173

3.2 Comparative Study

174

3.3 BSP in CDN

175

4 Conclusion

176

References

176

Artificial Intelligence and Evolutionary Algorithms

178

Attribute Reduction Method Using the Combination of Entropy and Fuzzy Entropy

179

1 Introduction

179

2 Priliminaries

181

2.1 Entropy Fuzzy Entropy

181

2.2 Nearest Neighbor

182

3 Proposed Method

182

4 Experimental Results

184

5 Conclusion

186

References

186

15 Evaluation of Factors Responsible for Road Accidents in India by Fuzzy AHP

188

Abstract

188

1 Introduction

188

2 Literature Review

189

3 Methodology

191

3.1 AHP and Fuzzy AHP Approach

191

4 Case Study

193

4.1 Problem Definition

193

5 Conclusion

196

References

196

16 Development of Knowledge Capsules for Custom-Tailored Dissemination of Knowledge of Seismic Data Interpretation

198

Abstract

198

1 Introduction

198

2 Related Work

199

3 Proposed Framework

201

4 Experimental Details

202

5 Conclusion

204

Acknowledgements

204

References

204

17 Design of Low Cost Blood Glucose Sensing System Using Diffused Reflectance Near-Infrared Light

206

Abstract

206

1 Introduction

207

2 Research Methodology

208

2.1 Light wavelength selection

209

2.2 In Vitro Prototype Design

210

2.3 In Vivo Prototype Design

211

2.3.1 Calibration Models for Estimation of the Blood Glucose

214

3 Experimental Results

218

3.1 In Vitro Experimentation

218

3.2 In Vivo Experimentation

220

4 Discussion

222

5 Conclusion

223

References

224

18 Hybrid Chunker for Gujarati Language

226

Abstract

226

1 Introduction

226

2 Earlier Relevant Work

227

3 Approach Used

228

4 Architecture of Proposed System

231

5 Experiments

232

6 Results

233

7 Conclusions

234

References

234

19 Sound Localization in 3-D Space Using Kalman Filter and Neural Network for Human like Robotics

236

Abstract

236

1 Introduction

236

1.1 Neurotransmission

237

1.2 Sound Localization

238

1.3 Types of Cues for Sound Localization

238

1.4 Localization Process

239

2 Related Work

240

3 Preliminaries

241

3.1 Coincidence Detectors

241

3.2 Kalman Filters

242

3.2.1 Prediction Step

242

3.2.2 Updation Step

243

4 Proposed System

245

5 Results and Discussion

248

5.1 Conclusion and Future Scope

251

References

251

20 Analysis of Stock Prices and Its Associated Volume of Social Network Activity

253

Abstract

253

1 Introduction

253

2 The Foundations of Social Network Analysis

254

2.1 Terminology

254

2.2 Structure of Social Networks

255

2.3 Network Evolution

255

2.4 Network Density

256

2.5 Network Performance

256

3 Literature Survey

256

3.1 Correlation Between Public Sentiment and Market Sentiment

257

3.2 Sentiment Analysis at the User Level

257

3.3 Logistical Regression Modeling

258

3.4 Disadvantage of Predictive Models

259

4 Volume of Twitter Activity

259

4.1 Procedure

260

5 Analysis

261

6 Mathematical Analysis

261

7 Conclusion

262

References

263

21 On Solutions to Capacitated Vehicle Routing Problem Using an Enhanced Ant Colony Optimization Technique

264

Abstract

264

1 Introduction

264

2 CVRP Formulation

265

3 Enhanced Ant Colony Optimization (ACO) Algorithm

266

4 Computational Results

267

5 Conclusion

272

References

272

22 Music Recommendation System with User-Based and Item-Based Collaborative Filtering Technique

274

Abstract

274

1 Introduction

274

2 Related Work

275

2.1 User-Item Rating Matrix

275

2.2 Collaborative Filtering (CF) Technique

276

2.2.1 User-Based CF

276

2.2.2 Item-Based CF

276

3 Proposed Algorithm

276

3.1 Similarity Measures

277

3.2 Normalization Techniques

277

3.3 Proposed Approach

278

3.3.1 Pre-processing of Data

278

3.3.2 Model Building

279

4 Results

280

4.1 Experimental Results

281

5 Conclusion and Future Scope

283

References

285

23 GLCM Feature Extraction for Insect Bites Pattern Recognition

286

Abstract

286

1 Introduction

287

2 Texture Analysis

287

3 GLCM

288

4 Extraction of Features from GLCM

289

5 Result

290

6 Conclusion and Future Work

291

References

292

24 A Novel Hybrid PSO-DA Algorithm for Global Numerical Optimization

294

Abstract

294

1 Introduction

295

2 Particle Swarm Optimization

295

3 Dragonfly Algorithm

296

4 The Hybrid PSO-DA Algorithm

298

5 Simulation Results for Unconstraint Test Benchmark Function

299

6 Overcurrent Relay Co-ordination with Common Configuration in Power System

300

7 Conclusions

303

Acknowledgements

303

References

304

25 Short-Term Electricity Price Forecasting Using Hybrid SARIMA and GJR-GARCH Model

306

Abstract

306

1 Introduction

307

2 The Proposed Approach

308

2.1 Wavelet Transform

308

2.2 SARIMA Model

310

2.3 GJR-GARCH Model

310

2.4 Hybrid SARIMA-GJR GARCH Model

311

3 Results and Discussion

312

4 Conclusion

316

References

316

Author Index

319

427613_1_En_26_Chapter_OnlinePDF.pdf

0

26 Erratum to: Design of Low Cost Blood Glucose Sensing System Using Diffused Reflectance Near-Infrared Light

318

Erratum to:Chapter “Design of Low Cost Blood Glucose Sensing System Using Diffused Reflectance Near-Infrared Light” in: G.M. Perez et al. (eds.), Networking Communication and Data Knowledge Engineering, Lecture Notes on Data Engineering and Communications Technologies 3, https://doi.org/10.1007/978-981-10-4585-1_17

318