A Comparison Based Clustering Algorithm to Counter SSDF Attack in CWSN (Englisch)
- Neue Suche nach: Chatterjee, Sukanya
- Neue Suche nach: Chatterjee, Pinaki S.
- Neue Suche nach: Chatterjee, Sukanya
- Neue Suche nach: Chatterjee, Pinaki S.
In:
2015 International Conference on Computational Intelligence and Networks
;
194-195
;
2015
-
ISSN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:A Comparison Based Clustering Algorithm to Counter SSDF Attack in CWSN
-
Beteiligte:Chatterjee, Sukanya ( Autor:in ) / Chatterjee, Pinaki S. ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.01.2015
-
Format / Umfang:271474 byte
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Modified DE Based ATC Enhancement Using FACTS DevicesSinha, Nidul / Karan, Sambit / Singh, Santosh Kr. et al. | 2015
- 9
-
Predicting Cumulative Number of Failures in Software Using an ANN-PSO Based ApproachBisi, Manjubala / Goyal, Neeraj Kumar et al. | 2015
- 15
-
Mining GitHub for Novel Change Metrics to Predict Buggy Files in Software SystemsMuthukumaran, K. / Choudhary, Abhinav / Murthy, N.L. Bhanu et al. | 2015
- 21
-
Gabor-Fast ICA Feature Extraction for Thermal Face Recognition Using Linear Kernel Support Vector MachineMajumder, Goutam / Bhowmik, Mrinal Kanti et al. | 2015
- 26
-
Supervised Machine Learning Approach for Microarray Classification of Malignant Tissues Using Soft Computing TechniquesKar, Utsav / Rana, Madhurima / Vijayeeta, Prachi / Das, Madhabananda et al. | 2015
- 32
-
A Novel Physics Inspired Multi-objective Optimization Algorithm: Multiple Objective Gravitational OptimizationChatterjee, Rajdeep / Das, Madhabananda et al. | 2015
- 36
-
Analysis of Telugu Palm Leaf Character Recognition Using 3D FeatureLakshmi, T.R. Vijaya / Sastry, Panyam Narahari / Krishnan, Ramakrishnan / Rao, N.V. Koteswara / Rajinikanth, T.V. et al. | 2015
- 47
-
A Comparative Study of PI and Fuzzy Controllers for Solar Powered DC-DC Boost ConverterPanda, Babita / Sarkar, Akashdeep / Panda, Bhagabat / Hota, P.K. et al. | 2015
- 52
-
Nonlinear Autonomous Control of a Two-Wheeled Inverted Pendulum Mobile Robot Based on Sliding ModeSinha, Abhinav / Prasoon, Pikesh / Bharadwaj, Prashant Kumar / Ranasinghe, Anuradha C. et al. | 2015
- 58
-
A Comparative Study of Adaptive Beamforming Techniques in Smart Antenna Using LMS Algorithm and Its VariantsSenapati, Anupama / Ghatak, Kaustabh / Roy, Jibendu Sekhar et al. | 2015
- 63
-
Blind Identification of Nonlinear MIMO System Using Differential Evolution Techniques and Performance Analysis of Its VariantsSwayamsiddha, Swati / Behera, Sabyasachi / Thethi, H. Pal et al. | 2015
- 68
-
Augmentation of Directional and Sector Antenna Support in NS2Ahmed, N. / Ahmed, Z.I. / Saikia, S.I. / Hussain, I. et al. | 2015
- 74
-
Enhancing Accuracy of Localization for Primary Users in Cognitive Radio NetworksChatterjee, S. / Banerjee, P. / Nasipuri, M. et al. | 2015
- 80
-
Driver Level Implementation of TDMA MAC in Long Distance WiFiAhmed, S.S. / Hussain, I. / Ahmed, N. et al. | 2015
- 86
-
Energy Efficient Coverage and Connectivity with Varying Energy Level in WSNMishra, Tarini / Panda, Alok Ranjan / Lenka, Manas Ranjan / Mahapatra, Debabrata / Swain, Amulya Ratna et al. | 2015
- 92
-
Incremental Model for Complete Area Coverage in Wireless Sensor NetworksSethi, Hemendra Kumar / Dash, Sasmita / Lenka, Manas Ranjan / Swain, Amulya Ratna et al. | 2015
- 98
-
Energy Optimized Path Selection in Cluster Based Routing for Wireless Mesh NetworkPrakash, S.P. Shiva / Nagabhushan, T.N. / Krinkin, Kirill et al. | 2015
- 104
-
A Non-heuristic Approach for Minimizing the Energy and Power Consumption in Wireless Multimedia Sensor NetworksBibhuprada, Sushree / Priyadarshini, B. / Panigrahi, Suvasini et al. | 2015
- 110
-
A Comparative Analysis of Packet Scheduling Schemes for Multimedia Services in LTE NetworksSahoo, B.P.S. / Puthal, Deepak / Swain, Satyabrata / Mishra, Sambit et al. | 2015
- 116
-
Cloud Computing Features, Issues, and Challenges: A Big PicturePuthal, Deepak / Sahoo, B.P.S. / Mishra, Sambit / Swain, Satyabrata et al. | 2015
- 124
-
Data Management System to Improve Security and Availability in Cloud StorageBanyal, R.K. / Jain, V.K. / Jain, Pragya et al. | 2015
- 130
-
Method for Higher Availability of the SSD Storage SystemMohanta, Taranisen / Basireddy, Ranjith Reddy / Nayaka, B. Govindaraja / Chirumamilla, Narendra et al. | 2015
- 136
-
Detection and Prevention against ARP Poisoning Attack Using Modified ICMP and VotingArote, Prerna / Arya, Karam Veer et al. | 2015
- 142
-
Intrusion Detection System for Power-Aware OLSRDutta, Chaitali Biswas / Biswas, Utpal et al. | 2015
- 148
-
A Comparative Study on Approaches to Speckle Noise Reduction in ImagesMaity, Alenrex / Pattanaik, Anshuman / Sagnika, Santwana / Pani, Santosh et al. | 2015
- 156
-
Analysing Fractal Dimension of Color ImagesNayak, Soumya Ranjan / Ranganath, Abadhan / Mishra, Jibitesh et al. | 2015
- 160
-
Real Time Face MorphingKasat, D.R. / Jain, Sanjeev / Thakare, V.M. et al. | 2015
- 166
-
A Survey on Blood Vessel Detection Methodologies in Retinal ImagesDash, Jyotiprava / Bhoi, Nilamani et al. | 2015
- 172
-
An Approach for Minimizing the Time Taken by Video Processing for Translating Sign Language to Simple Sentence in EnglishKar, Aradhana / Chatterjee, Pinaki Sankar et al. | 2015
- 178
-
An Advanced Image Encryption Standard Providing Dual Security: Encryption Using Hill Cipher & RGB Image SteganographyDebnath, Dipanwita / Deb, Suman / Kar, Nirmalya et al. | 2015
- 184
-
An Efficient Algorithm for Boundary DetectionMondal, Sayantan / Ali, Israj et al. | 2015
- 188
-
Numerical Solution of Interval Nonlinear System of EquationsNayak, Sandeep / Chakraverty, S. et al. | 2015
- 190
-
A Systematic Literature Review of an Object Oriented Metric: ReusabilityPadhy, Neelamadhab / Panigrahi, Rasmita / Baboo, Sarada et al. | 2015
- 192
-
A Survey on Cloud Environment Security Risk and RemedyAich, Asish / Sen, Alo / Dash, Satya Ranjan et al. | 2015
- 194
-
A Comparison Based Clustering Algorithm to Counter SSDF Attack in CWSNChatterjee, Sukanya / Chatterjee, Pinaki S. et al. | 2015
- 196
-
DDOS Attack Detection and Mitigation Technique Based on Http Count and Verification Using CAPTCHASingh, Khundrakpam Johnson / De, Tanmay et al. | 2015
- 198
-
Author index| 2015
- 200
-
[Publisher's information]| 2015
- C4
-
[Front cover]| 2015
- i
-
[Title page i]| 2015
- iii
-
[Title page iii]| 2015
- iv
-
[Copyright notice]| 2015
- ix
-
Message from the Chief Patron| 2015
- v
-
Table of contents| 2015
- x
-
Message from the General Chair| 2015
- xi
-
Message from the Organizing Chair| 2015
- xii
-
Message from the Program Chair| 2015
- xiii
-
Committees| 2015
- xviii
-
Invited Talks| 2015