An analytical model for performance analysis of mobile ad hoc network using queueing approach (Englisch)
- Neue Suche nach: Ali, Aleem
- Neue Suche nach: Singh, Neeta
- Neue Suche nach: Ali, Aleem
- Neue Suche nach: Singh, Neeta
In:
2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
;
396-399
;
2017
-
ISBN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:An analytical model for performance analysis of mobile ad hoc network using queueing approach
-
Beteiligte:Ali, Aleem ( Autor:in ) / Singh, Neeta ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.09.2017
-
Format / Umfang:359920 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
[Copyright notice]| 2017
- 1
-
Author index| 2017
- 1
-
[Title page]| 2017
- 1
-
Contents| 2017
- 1
-
[Front cover]| 2017
- 1
-
Future of technology — Are we ready?Pendse, Ravi et al. | 2017
- 2
-
Elementary software reliability growth modelingYamada, Shigeru et al. | 2017
- 11
-
Towards a methodology for self-verificationLuth, Christoph / Ring, Martin / Drechsler, Rolf et al. | 2017
- 16
-
Modeling with fuzzy transforms — A new tool of data mining and quantitative financePerfilieva, Irina et al. | 2017
- 22
-
Cost-, spectrum-, and energy-efficient distributed collaborative beamforming designs for real-world applicationsZaidi, Slim / Ben Smida, Oussama / Affes, Sofiene et al. | 2017
- 31
-
Multi-generation diffusion of technologyKapur, P. K. / Panwar, Saurabh / Shrivastava, A. K. / Khatri, Sunil Kumar et al. | 2017
- 38
-
Digital healthcare securityRhalibi, Abdennour El et al. | 2017
- 39
-
On the use of cloud computing for big data miningTalia, Domenico et al. | 2017
- 41
-
Sentiment analysis and opinion mining: Keynote addressGelbukh, Alexander et al. | 2017
- 48
-
Smart technology solutions for healthy communities in Africavan Greunen, Darelle et al. | 2017
- 49
-
Dynamic high-level in self-adaptive systemsRossi, Davide / Poggi, Francesco / Ciancarini, Paolo et al. | 2017
- 61
-
Blockchain computing: Prospects and challenges for digital transformationHossain, Syed Akhter et al. | 2017
- 66
-
Computational intelligence for risk analysis in software testingMohammadian, Masoud et al. | 2017
- 70
-
Sustainable software engineering: A move towards futureMishra, Alok et al. | 2017
- 71
-
Technique of heater assembly process efficiency improvement on the basis of lean manufacture conceptKlochkov, Y. et al. | 2017
- 78
-
Towards exascale computingKettani, Houssain et al. | 2017
- 81
-
Strategy for the data monetization in tune with the data stream processingDivan, Mario Jose et al. | 2017
- 92
-
Intentional modeling with institution theoryBettaz, Mohamed / Maouche, Mourad et al. | 2017
- 99
-
Model based testing of distributed time critical systemsVain, Juri / Kanter, Gert / Srinivasan, Seshadhri et al. | 2017
- 106
-
Reliability and maintainability analysis and its toolbased on deep learning for fault big dataTamura, Yoshinobu / Yamada, Shigeru et al. | 2017
- 112
-
Can computer resilience techniques tackle the problem of fake news?Elnozahy, Elmootazbellah Mootaz N. et al. | 2017
- 113
-
Application of paraconsistent annotated logic program EVALPSN to intelligent control/safety verificationNakamatsu, Kazumi et al. | 2017
- 114
-
Quality management tools and techniques in major infra-structure projectsBasu, Ron et al. | 2017
- 127
-
Reliability modeling approach for system analysisRizwan, Syed Mohd et al. | 2017
- 128
-
Software reliability modeling with imperfect debugging and change of test environmentInoue, Shinji / Yamada, Shigeru et al. | 2017
- 132
-
Recent advances in ad-hoc networksRamasamy, Velmani et al. | 2017
- 133
-
An approach to decrease the risk of losing customersKlochkov, Y. / Klochkova, E. / Krasyuk, I. / Krymov, S. / Gasyuk, D. / Akobiya, N. et al. | 2017
- 143
-
Uncovering the latent defects in dimming control devices by introducing application specific stress profile in HALT — A case studyPandey, Vikas / Rabha, Utpal / Pandit, Gayatri / Sabde, Swapnil et al. | 2017
- 148
-
Influence of firm's marketing capacity and its strategic integration ability on the innovative performanceKonnikov, E. A. / Yuldasheva, O. U. / Pogrebova, O. A. / Trefilova, I. N. / Solovjova, J. N. / Furtatova, A. S. et al. | 2017
- 155
-
Comparison and failure mode analysis of current signature based relay health monitoring schemesWadhawan, Priyanka / Kumar, Manoj / Mayya, Anuradha / Marathe, P. P. et al. | 2017
- 162
-
Selecting the best use option for assets in a corporate management systemOzerov, E. S. / Pupentsova, S. V. / Leventsov, V. A. / Dyachkov, M. S. et al. | 2017
- 171
-
Quality assessment and drift analysis of IoT enabled ammonia sensorGupta, Khushboo / Kishore, Kaushal / Jain, S. C. et al. | 2017
- 177
-
Intra-ocular lens defect detection using generalized hough transformJothi, Adityan / Jayaram, Shrinivas / Yogesh, / Dubey, A. K. et al. | 2017
- 182
-
Thermal wear of cable lines isolation research owing to current flow of the high harmonics at oil extraction electrical generating systemsGudkov, A. V. / Dadonov, D. N. / Krotkov, E. A. / Shchepinin, V. E. / Didenko, N. I. / Parkhomenko, V. et al. | 2017
- 188
-
Assessment of systemic effects from integration of distributed generation facilities into regional energy systemsKhabachev, L. D. / Plotkina, U. I. / Bugaeva, T. M. / Yurkova, A. B. et al. | 2017
- 194
-
Relative performance of multipliers: A fault tolerance perspective for parallel FFTsInala, Sai Satish / Pushpalatha, P. et al. | 2017
- 199
-
Reliability analysis of a subsystem in aluminium industry plantRahbi, Yaqoob Al / Rizwan, S. M. / Alkali, B. M. / Cowel, Andrew / Taneja, G. et al. | 2017
- 204
-
Assessment of machine learning algorithms for determining defective classes in an object-oriented softwareSingh, Prabhpahul / Malhotra, Ruchika et al. | 2017
- 210
-
Research on channel estimation algorithm of MIMO relay system based on PARAFAC modelZhang, Kui Yuan / Li, Jianping / Guo, Er Jian et al. | 2017
- 215
-
Iterative parallel shift sort : Optimization and design for area constrained applicationsDiware, Sumit / Krishna, Sharath B. et al. | 2017
- 222
-
Organizational models of teal organizationsAntipov, D. V. / Akhmetzhanova, G. V. / Antipova, O. I. / Gazizulina, A. U. / Sharov, R. et al. | 2017
- 231
-
Wire material electrical parameters for the inductor technological complex in production of plastic moldingSorokin, A. / Filimonova, O. / Glukhov, V. / Mirolyubova, O. / Rodionova, U. et al. | 2017
- 234
-
Covert communication device for electrotechnical systems based on invariant transformKozlovsky, V. / Shakurskiy, M. / Ermakov, V. / Konakhina, N. / Grushkin, A. et al. | 2017
- 239
-
Performance analysis of estimators using PSO for multi-target trackingKumar, D. Naveen / Kumari, B. Leela et al. | 2017
- 245
-
Optimisation of circular monopole UWB antenna using the concept of golden ratioKeshwala, Ushaben / Nair, Nivedita / Muquit, Sahana Parvin et al. | 2017
- 248
-
Estimating reliability for OSS: An approach with change-point in operational phaseGandhi, Neha / Neha, / Aggarwal, Anu G. / Tandon, Abhishek et al. | 2017
- 254
-
Wavelet based approaches in optimization theory and practiceAgarwal, Ruchi / Salimath, C. S. / Alam, Khursheed et al. | 2017
- 261
-
Disassembly index evaluation of automotive systems using graph theory and AHPGupta, Kavya / Dangayach, Tanay / Kumar, Girish / Gupta, Piyush et al. | 2017
- 267
-
Impact of development methodology on cost & risk for development projectsDayal Chauhan, Bishan / Rana, Ajay / Sharma, Neeraj Kumar et al. | 2017
- 273
-
Mathematical modeling of Arc extinction process in devices with liquid-metal contactKireev, K. V. / Ermakov, V. V. / Kikkas, K. / Shcheglova, A. E. / Gasyuk, D. P. / Rodionova, U. et al. | 2017
- 278
-
Source code management using version control systemMajumdar, Rana / Jain, Rachna / Barthwal, Shivam / Choudhary, Chetna et al. | 2017
- 282
-
Intelligent diagnostic complex of electromagnetic compatibility for automobile ignition systemsPetrovski, S. V. / Kozlovski, V. N. / Petrovski, A. V. / Skripnuk, D. F. / Schepinin, V. E. / Telitsyna, E. et al. | 2017
- 289
-
Modeling and simulation of CEERI's water distribution network to detect leakage using HLR approachGupta, Khushboo / Kishore, Kaushal / Jain, S. C. et al. | 2017
- 295
-
Research features of voltage static load characteristics in the electric system of RussiaGudkov, A. V. / Dadonov, D. N. / Krotkov, E. A. / Krasulina, O. / Akobiya, N. et al. | 2017
- 301
-
Analysis of evolutionary algorithms to improve software defect predictionMalhotra, Ruchika / Khurana, Anshu et al. | 2017
- 306
-
Peculiarities of mechanism for implementation of public-private partnership in industryBabkin, I. A. / Babkin, A. V. / Smolskaia, N. B. / Khrebtenko, I. S. et al. | 2017
- 314
-
Design of radix-4,16,32 approx booth multiplier using Error Tolerant ApplicationJain, Gunjan / Jain, Meenal / Gupta, Gaurav et al. | 2017
- 321
-
Model selection among log-normal, Weibull, Gamma and generalized exponential distributionsRoshan, Shashi / Mohan, Biju R. / Kumar, Manish / Vandanapu, Nikhil et al. | 2017
- 326
-
Experiences in the business process modelling at public organizations of La PampaDivan, Mario / Reynoso, Ma Laura Sanchez / Veralli, Fabiana / Ostoich, Mariana et al. | 2017
- 333
-
BiDuR: Big data analysis in UAF using R-voting systemVarshney, Karishma / Johari, Rahul / Ujjwal, R. L. et al. | 2017
- 338
-
Diagnosis of diabetic nature of a person using SVM and ANN approachAliwadi, Shreya / Shandila, Vrinda / Gahlawat, Tanisha / Kalra, Parul / Mehrotra, Deepti et al. | 2017
- 344
-
Finding similarity in articles using various clustering techniquesDeeksha, / Sahu, Shashank et al. | 2017
- 348
-
Anti social comment classification based on kNN algorithmChandra, Nidhi / Khatri, Sunil Kumar / Som, Subhranil et al. | 2017
- 355
-
Analyzing barriers to sustainable dairy supply chain using preference rating approachRohra, S. / Dangayach, T. / Tyagi, M. et al. | 2017
- 360
-
Enhancing student learning behaviour using EDM and psychometric analysisBurman, Iti / Som, Subhranil / Sharma, Mayank et al. | 2017
- 364
-
Genetic approach based image retrieval by using CCM and textual featuresShrivas, Parul / Lilhore, Umesh / Agrawal, Nitin et al. | 2017
- 371
-
A detailed study of clustering algorithmsBindra, Kamalpreet / Mishra, Anuranjan et al. | 2017
- 377
-
Product opinion mining using sentiment analysis on smartphone reviewsChawla, Shilpi / Dubey, Gaurav / Rana, Ajay et al. | 2017
- 384
-
Beyond passive detection of sybil attacks in VANETMohamed, Mohamed S. / Dandekhya, Prajjwol / Krings, Axel et al. | 2017
- 391
-
Trust modeling for secure route discovery in mobile ad-hoc networksWadhwani, Ganesh Kumar / Khatri, Sunil Kumar / Muttoo, S. K. et al. | 2017
- 396
-
An analytical model for performance analysis of mobile ad hoc network using queueing approachAli, Aleem / Singh, Neeta et al. | 2017
- 400
-
User-based multi-upgradation vulnerability discovery modelNarang, Swati / Kapur, P. K. / Damodaran, D. / Shrivastava, A. K. et al. | 2017
- 406
-
An automatic irrigation system for different crops with WSNKaur, Sandeep / Deepali, et al. | 2017
- 412
-
Fractal antenna for wireless applicationsKhade, Sachin S. / Bire, Pallavi Dhanendra et al. | 2017
- 416
-
Arithmetic coding based string approximationSharma, Mayank et al. | 2017
- 423
-
The relationship between user preferences in interactive information retrieval evaluationGahlawat, Tanisha / Bhatia, Parul Kalra / Mehrotra, Deepti et al. | 2017
- 427
-
E-health application using network coding based caching for Information-centric networking (ICN)Lal, Kumari Nidhi / Kumar, Anoj et al. | 2017
- 432
-
A Naïve Bayes Approach for working on Gurmukhi Word Sense DisambiguationWalia, Himdweep / Rana, Ajay / Kansal, Vineet et al. | 2017
- 436
-
PHP vulnerability detection based on taint analysisCao, Kai / He, Jing / Fan, Wenqing / Huang, Wei / Chen, Lei / Pan, Yue et al. | 2017
- 440
-
Authentication through electrocardiogram signals based on emotions-a step towards ATM securityGupta, Shivangi / Chowdhary, Sunil Kumar et al. | 2017
- 443
-
A trust model for security and privacy in cloud servicesHimanshu, Gupta / Desire Afewou, Kodjo et al. | 2017
- 451
-
A study on web application security and detecting security vulnerabilitiesKumar, Sandeep / Mahajan, Renuka / Kumar, Naresh / Khatri, Sunil Kumar et al. | 2017
- 456
-
Human identification and verification based on signature, fingerprint and iris integrationAgarwal, Vikramaditya / Sahai, Akshay / Gupta, Akshay / Jain, Nidhi et al. | 2017
- 462
-
Timing attack analysis on AES on modern processorsKaushik, Prakhar / Majumdar, Rana et al. | 2017
- 466
-
Code based threshold scheme on group key transfer protocol for WSN'sArya, Naina / Devgan Kaul, Sonam et al. | 2017
- 472
-
Analysis of multimodal biometrie recognition using Iris and scleraGuliani, Neha / Shukla, Manoj Kumar / Dubey, Ashwani Kumar / Jaffery, Zainul Abdin et al. | 2017
- 476
-
Hybrid bucket sort switching internal sorting based on the data inside the bucketKhurana, Medha / Faujdar, Neetu / Saraswat, Shipra et al. | 2017
- 483
-
Hardware implementation of sun tracking solar panel using 8051 micro-controllerSharma, Vasudha / Tayal, Vijay Kumar et al. | 2017
- 487
-
Time optimization in spectrum sensing: Interesting casesMurthy, Garimella Rama / Singh, Rhishi Pratap et al. | 2017
- 493
-
Design and analysis of symmetrical notch S shape patch antenna for wideband applicationsSingh, Shipra / Verma, Rahul Kumar et al. | 2017
- 496
-
Single layer proximity fed microstrip patch antenna for circularly polarized dual band wireless applicationsGoel, Ankit / Kumar, Sachin / Saxena, Shobhit / Tiwari, Rahul et al. | 2017
- 500
-
Implementation of a high-speed pipelined FFT processor using dadda multipliers to process two independent data streamsGanesh, K. / Pushpalatha, P. et al. | 2017
- 505
-
Technology for affordable, inclusive, and efficient healthcare — Case study of AmbuPodChitrao, Pradnya Vishwas / Bhoyar, Pravin Kumar et al. | 2017
- 510
-
Rule based trust evaluation using fuzzy logic in cloud computingRathi, Poorva / Ahuja, Himanshu / Pandey, Kavita et al. | 2017
- 515
-
Security model of ad hoc cloud computingSharma, Deepti et al. | 2017
- 519
-
Energy efficient strategy for cloud based big dataSolanki, Neha / Kachhwaha, Rajendra et al. | 2017
- 523
-
Need and scope of Private Cloud Technology for public authority for radio & television in OmanRasbi, Mohammed Abdullah Al / Singh, Ajay Vikram et al. | 2017
- 529
-
Cloud security architecture based on user authentication and symmetric key cryptographic techniquesWani, Abdul Raoof / Rana, Q. P. / Pandey, Nitin et al. | 2017
- 535
-
Learning resources as a service (LraaS) for Higher Education Institutions in Sultanate of OmanBhat, Anjum Zameer / Singh, Baldev / Singh, Ajay Vikram et al. | 2017
- 541
-
Real options valuation of additive productionKonnikov, E. A. / Pogrebova, O. A. / Maskova, Y. R. / Glukhov, V. V. et al. | 2017
- 548
-
Implementation of artificial intelligence cognitive neuroscience neuron cell using adaptive velocity threshold particle swarm optimization (AVT-PSO) on FPGASingh, Divya / Prasad, Sunita / Srivastava, Sandeep et al. | 2017
- 553
-
Methodical forming business competencies for private labelKrasnov, S. V. / Sergeev, S. M. / Mukhanova, N. V. / Grushkin, A. N. et al. | 2017
- 559
-
An adaptive neuro-fuzzy inference system for detecting redirection spamHans, Kanchan / Ahuja, Laxmi / Muttoo, S. K. et al. | 2017
- 565
-
Complex approach to selecting priority lines of business by an enterpriseAbushova, E. / Burova, E. / Suloeva, S. / Shcheglova, A. et al. | 2017
- 570
-
Knowledge structures in elementarytextbooksParameswaran, Nandan / Maheshwari, Piyush et al. | 2017
- 576
-
Usability and usefulness in designing patient-centric systems in afro-centric settingPakomera, Richard / van Greunen, Darelle / Veldsman, Alida et al. | 2017
- 580
-
Classic from the outside, smart from the inside: The era of smart buildingsRafiq, Nafhath Rasheeda / Mohammed, Sadia Fatima / Pandey, Jitendra / Singh, Ajay Vikram et al. | 2017
- 585
-
Analysis of IoT security at network layerSharma, Rahul / Pandey, Nitin / Khatri, Sunil Kumar et al. | 2017
- 591
-
Development of microcontroller based lemon ripening condition monitoring systemKhera, Neeraj / Shukla, Divya / Sharma, Priya / Dar, Ishfaq Gaffar et al. | 2017
- 594
-
Fixed DO Solfège based object detection and positional analysis for the visually impairedKalra, Siddharth / Jain, Sarika / Agarwal, Amit et al. | 2017
- 599
-
Malarial parasites detection in RBC using image processingSaraswat, Shipra / Awasthi, Utkarsh / Faujdar, Neetu et al. | 2017
- 604
-
A comparative approach for image segmentation to identify the defected portion of appleYogesh, / Singhal, Priyanshi / Dubey, Ashwani Kumar / Goyal, Ayush et al. | 2017
- 609
-
Identification & enhancement of different skin lesion images by segmentation techniquesMittal, Neetu / Tanwar, Sudhir / Khatri, Sunil Kumar et al. | 2017
- 615
-
Segmentation techniques for external defect detection in pome fruitsYogesh, / Dubey, A. K. / Vyas, Tanmaya / Thukral, Mayank et al. | 2017
- 619
-
Enhancement of medical images using Kalman filterPandey, Pranshu / Jain, Sarika / Khatri, Sunil Kumar et al. | 2017
- 624
-
A review and comprehensive comparison of image de-noising techniquesYogesh, / Dubey, Ashwani Kumar / Arora, Rajeev / Yadav, Shivkant et al. | 2017
- 630
-
Enhancement of historical documents by image processing techniquesMittal, Neetu / Sehgal, Arjun / Khatri, Sunil Kumar et al. | 2017
- 636
-
Up sampling of an image using convolution methodSingh, Richa / Dubey, Ashwani Kumar / Kapoor, Rajiv et al. | 2017
- 640
-
Segmentation based non local means filter for denoising MRIJoshi, Nikita / Jain, Sarika / Agarwal, Amit et al. | 2017
- 645
-
A comparative review of various segmentation methods and its applicationYogesh, / Dubey, Ashwani Kumar / Arora, Rajeev / Ahmed, Ashad et al. | 2017
- 651
-
Analysis of various techniques of feature extraction on skin lesion imagesSengupta, Sudhriti / Mittal, Neetu et al. | 2017
- 657
-
The content aspect of the tendency to reflect the actual result of managementShchepinin, V. E. / Leventsov, V. A. / Zabelin, B. F. / Konnikov, E. A. / Kasianenko, E. O. et al. | 2017
- 663
-
Impact of social media on society in a large and specific to teenagersAl-Sabti, Duaa Ali / Singh, Ajay Vikram / Jha, S. K. et al. | 2017
- 668
-
The power of networking: Bridging the gap between HE students and enterpreneurs in OmanOmar, Ali Salem / Hussain, Shaik Mazhar / Singh, Ajay Vikram et al. | 2017
- 674
-
E-learning tools to enhance student learning experience: A practice on control system engineeringHussain, Shaik Mazhar / Balushi, Maryam Mubarak Muhammad Al / Omar, Ali Salem / Singh, Ajay Vikram / Ramaiah, Chandrasekhar et al. | 2017
- 678
-
An assessment of feature selection based mechanism to recommend friends in online social networksDhawan, Sanjeev / Singh, Kulvinder / Jain, Ashu et al. | 2017
- 683
-
Evaluation of job satisfaction in food manufacturing sector in OmanSaidi, Yusra Al / Singh, Ajay Vikram / Jha, S. K. et al. | 2017
- 688
-
Development of web based parameter monitoring of milkKhera, Neeraj / Shukla, Divya / Khokhar, Jagjot Singh / Kumar, Vipul et al. | 2017
- 691
-
A review of different road safety measures and enforcementsAl-Adhoobi, Mohammed Saud / Jose, Manju / Singh, Ajay Vikram et al. | 2017
- 698
-
Energy efficiency in “Green construction”: Experience, issues, trendsMakarov, V. M. / Novikova, O. V. / Tabakova, A. S. et al. | 2017
- 704
-
A review of international practices of road safety auditsAl-Adhoobi, Mohammed Saud / Jose, Manju / Singh, Ajay Vikram et al. | 2017
- I
-
ICRITO'2017 (CRN 41188) list of keynote| 2017
- I
-
ICRITO'2017 CRN 41188 organizers| 2017
- IV
-
Acknowledgement| 2017
- VI
-
ICRITO'2017 conference committees| 2017