A SOFT COMPUTING APPROACH FOR IMAGE SEARCHING USING VISUAL RERANKING
Part III Soft Computing (AI, Neural Networks, Fuzzy Systems ...
-
Upload
khangminh22 -
Category
Documents
-
view
3 -
download
0
Transcript of Part III Soft Computing (AI, Neural Networks, Fuzzy Systems ...
Table of Contents - Part III
Soft Computing (AI, Neural Networks, FuzzySystems, etc.)
Analysis of the Severity of Hypertensive Retinopathy Using FuzzyLogic 1
Aravinthan Parthibarajan, Gopalakrishnan Narayanamurthy,Arun Srinivas Parthibarajan, and Vigneswaran Narayanamurthy
An Intelligent Network for Offline Signature Verification Using ChainCode 10
Minal Tomar and Pratibha Singh
An Improved and Adaptive Face Recognition Method Using SimplifiedFuzzy ARTMAP 23
Antu Annam Thomas and M. Wilscy
An Automatic Evolution of Rules to Identify Students' MultipleIntelligence 35
Kunjal Mankad, Priti Srinivas Sajja, and Rajendra Akerkar
A Survey on Hand Gesture Recognition in Context of SoftComputing 46
Ankit Chaudhary, J.L. Raheja, Karen Das, and Sonia Raheja
Handwritten Numeral Recognition Using Modified BP ANNStructure 56
Amit Choudhary, Rahul Rishi, and Savita Ahlawat
Expert System for Sentence Recognition 66Bipul Pandey, Anupam Shukla, and Ritu Tiwari
RODD: An Effective .Reference-Based Outlier Detection Technique forLarge Datasets 76
Monowar H. Bhuyan, D.K. Bhattacharyya, and 3.K. Kalita
Distributed and Parallel Systems and Algorithms
A Review of Dynamic Web Service Composition Techniques 85Demian Antony D'Mello, V.S. Ananthanarayana, and Supriya Salían
Output Regulation of Arneodo-Coullet Chaotic System 98Sundarapandian Vaidyanathan
Bibliografische Informationenhttp://d-nb.info/1009236172
digitalisiert durch
XII Table of Contents - Part III
A High-Speed Low-Power Low-Latency Pipelined ROM-Less DDFS 108Indranil Hatai and Indrajit Chakrabarti
A Mathematical Modeling of Exceptions in Healthcare Workflow 120Sumagna Patnaik
Functional Based Testing in Web Services Integrated SoftwareApplications 130
Selvakumar Ramachandran, Lavanya Santapoor, andHaritha Rayudu
Design and Implementation of a Novel Distributed Memory FileSystem 139
Urvashi Karnani, Rajesh Kalmady, Phool Chand,Anup Bhattacharjee, and B.S. Jagadeesh
Decentralized Dynamic Load Balancing for Multi Cluster GridEnvironment 149
Malarvizhi Nandagopal and V. Rhymend Uthariaraj
Adoption of Cloud Computing in e-Governance 161Rama Krushna Das, Sachidananda Patnaik, and Ajita Kumar Misro
Efficient Web Logs Stair-Case Technique to Improve Hit Ratios ofCaching 173
Khushboo Hemnani, Dushyant Chawda, and Bhupendra Verma
A Semantic Approach to Design an Intelligent Self Organized SearchEngine for Extracting Information Relating to Educational Resources... 183
B. Saleena, S.K. Srivatsa, and M. Chenthil Kumar
Cluster Bit Collision Identification for Recognizing Passive Tags inRFID System 190
Katheeja Parveen, Sheik Abdul Khader, and Munir Ahamed Rabbani
Integration Testing of Multiple Embedded Processing Components 200Hara Gopal Manx Pakala, K. V.S. V.N. Raju, and Ibrahim Khan
Security and Information Assurance
A New Defense Scheme against DDoS Attack in Mobile Ad HocNetworks 210
S.A. Arunmozhi and Y. Venkataramani
A M o d e l for D e l e g a t i o n B a s e d o n A u t h e n t i c a t i o n a n d A u t h o r i z a t i o n . . . . 217Coimbatore Chandersekaran and William R. Simpson
Identification of Encryption Algorithm Using Decision Tree 237R. Manjula and R. Anitha
Table of Contents - Part III XIII
A Novel Mechanism for Detection of Distributed Denial of ServiceAttacks 247
Jaydip Sen
Authenticating and Securing Mobile Applications Using Microlog 258Siddharth Gupta and Sunil Kumar Singh
Assisting Programmers Resolving Vulnerabilities in Java WebApplications 268
Pranjal Bathia, Bharath Reddy Beerelli, and Marc-André Laverdière
Estimating Strength of a DDoS Attack Using Multiple RegressionAnalysis 280
B.B. Gupta, P.K. Agrawal, R.C. Joshi, and Manoj Misra
A Novel Image Encryption Algorithm Using Two Chaotic Maps forMedical Application 290
G.A. Sathishkumar, K. Bhoopathybagan, N. Sriraam,SP. Venkatachalam, and R. Vignesh
Chest X-Ray Analysis for Computer-Aided Diagnostic 300Kim Le
Overcoming Social Issues in Requirements Engineering 310Selvakumar Ramachandran, Sandhyarani Dodda, andLavanya Santapoor
Ad Hoc and Ubiquitous Computing
Range-Free Localization for Air-Dropped WSNs by FilteringNeighborhood Estimation Improvements 325
Eva M. García, Aurelio Bermúdez, and Rafael Casado
Evolution of Various Controlled Replication Routing Schemes forOpportunistic Networks 338
Hemal Shah and Yogeshwar P. Kosta
Collaborative Context Management and Selection in Context AwareComputing 348
B. Vanathi and V. Rhymend Uthariaraj
Privacy Preservation of Stream Data Patterns Using Offset and TrustedThird Party Computation in Retail-Shop Market Basket Analysis 358
Keshavamurthy B.N. and Durga Toshniwal
XIV Table of Contents - Part III
Wireless Ad Hoc Networks and Sensor Networks
Application of Euclidean Distance Power Graphs in Localization ofSensor Networks 367
G.N. Purohit, Seema Verma, and Usha Sharma
A New Protocol to Secure AODV in Mobile AdHoc Networks 378Avinash Krishnan, Aishwarya Manjunath, and Geetha J. Reddy
Spelling Corrector for Indian Languages 390K.V.N. Sunitha and A. Sharada
Voltage Collapse Based Critical Bus Ranking 400Shobha Shankar and T. Ananthapadmanabha
Multiplexer Based Circuit Synthesis with Area-Power Trade-Off 410Sambhu Nath Pradhan and Santanu Chattopadhyay
Exergaming - New Age Gaming for Health, Rehabilitation andEducation 421
Ankit Kamal
Inclusion/Exclusion Protocol for RFID Tags 431Selwyn Piramuthu
Min Max Threshold Range (MMTR) Approach in PalmprintRecognition 438
Jyoti Malik, G. Sainarayanan, and Ratna Dahiya
Power and Buffer Overflow Optimization in Wireless Sensor Nodes 450Gauri Joshi, Sudhanshu Dwivedi, Anshul Goel,Jaideep Mulherkar, and Prabhat Ranjan
Web Log Data Analysis and Mining 459L.K. Joshila Grace, V. Maheswari, and Dhinaharan Nagamalai
Steganography Using Version Control System 470Vaishali S. Tidake and Sopan A. Talekar
Author Index 481
Table of Contents - Part I
Distributed and Parallel Systems and Algorithms
Improved Ant Colony Optimization Technique for Mobile AdhocNetworks 1
Mano Yadav, K. V. Arya, and Vinay Rishiwal
A Performance Comparison Study of Two Position-Based RoutingProtocols and Their Improved Versions for Mobile Ad Hoc Networks . . . 14
Natarajan Meghanathan
Privacy Preserving Naïve Bayes Classification Using Trusted ThirdParty Computation over Distributed Progressive Databases 24
Keshavamurthy B.N. and Durga Toshniwal
Cluster Based Mobility Considered Routing Protocol for Mobile AdHoc Network 33
Soumyabrata Saha and Rituparna Chaki
Speech T ransac t i on for Bl inds Using Speech-Text-Speech C o n v e r s i o n s . . . 43Johnny Kanisha and G. Balakrishanan
Floating-Point Adder in Techology Driven High-Level Synthesis 49M. Joseph, Narasimha B. Bhat, and K. Chandra Sekaran
Differential Artificial Bee Colony for Dynamic Environment 59Syed Raziuddin, Syed Abdul Sattar, Rajya Lakshmi, and Moin Parvez
FAM2BP: Transformation Framework of UML Behavioral Elementsinto BPMN Design Element 70
Jayeeta Chanda, Ananya Kanjilal, Sabnam Sengupta, andSwapan Bhattacharya
A Cross-Layer Framework for Adaptive Video Streaming over IEEE802.11 Wireless Networks 80
Santhosha Rao, M. Vijaykumar, and Kumara Shama
FIFO Optimization for Energy-Performance Trade-off in Mesh-of-TreeBased Network-on-Chip 90
Santanu Kundu, T. V. Ramaswamy, and Santanu Chattopadhyay
Outliers Detection as Network Intrusion Detection System Using MultiLayered Framework 101
Nagaraju Devarakonda, Srinivasulu Pamidi, Valli Kumari V., andGovardhan A.
XVI Table of Contents - Part I
A New Routing Protocol for Mobile Ad Hoc Networks 112S. Rajeswari and Y. Venkataramani
Remote-Memory Based Network Swap for Performance Improvement . . . 125Nirbhay Chandorkar, Rajesh Kalmady, Phool Chand,Anup K. Bhattacharjee, and B.S. Jagadeesh
Collaborative Alert in a Reputation System to Alleviate ColludingPacket Droppers in Mobile Ad Hoc Networks 135
K. Gopalakrishnan and V. Rhymend Uthariaraj
Secure Service Discovery Protocols for Ad Hoc Networks 147Haitham Elwahsh, Mohamed Hashem, and Mohamed Amin
Certificate Path Verification in Peer-to-Peer Public Key Infrastructuresby Constructing DFS Spanning Tree 158
Balachandra, Ajay Rao, and K. V. Prema
A Novel Deadlock-Free Shortest-Path Dimension Order RoutingAlgorithm for Mesh-of-Tree Based Network-on-Chip Architecture 168
Kanchan Manna, Santanu Chattopadhyay, and Indranil Sen Gupta
2-D DOA Estimation of Coherent Wideband Signals Using L-ShapedSensor Array 179
P.M. Swetha and P. Palanisamy
An Approach towards Lightweight, Reference Based, Tree StructuredTime Synchronization in WSN 189
Surendra Rahamatkar and Ajay Agarwal
Towards a Hierarchical Based Context Representation and Selection byPruning Technique in a Pervasive Environment 199
B. Vanathi and V. Rhymend Uthariaraj
An Analytical Model for Sparse and Dense Vehicular Ad hocNetworks 209
Sara Najafzadeh, Norafida Ithnin, and Ramin Karimi
MIMO Ad Hoc Networks-Mutual Information and Channel Capacity . . . 217Chowdhuri Swati, Mondai Arun Kumar, and P.K. Baneerjee
Optimization of Multimedia Packet Scheduling in Ad Hoc NetworksUsing Multi-Objective Genetic Algorithm 225
R. Muthu Selvi and R. Rajaram
TRIDNT: Isolating Dropper Nodes with Some Degree of Selfishness inMANET 236
Ahmed M. Abd El-Haleem, Ihab A. Ali, Ibrahim I. Ibrahim, andAbdel Rahman H. El-Sawy
Table of Contents - Part I XVII
DSP/Image Processing/Pattern Recognition/Multimedia
Physiologically Based Speech Synthesis Using Digital WaveguideModel 248
A.R. Patil and V.T. Chavan
Improving the Performance of Color Image Watermarking UsingContourlet Transform 256
Dinesh Kumar and Vijay Kumar
Face Recognition Using Multi-exemplar Discriminative PowerAnalysis 265
Ganesh Bhat and K.K. Achary
Efficient Substitution-Diffusion Based Image Cipher Using ModifiedChaotic Map 278
/. Shatheesh Sam, P. Devaraj, and R.S. Bhuvaneswaran
Non Local Means Image Denoising for Color Images Using PCA 288P.A. Shy jila and M. Wilscy
An Iterative Method for Multimodal Biometrie Face Recognition UsingSpeech Signal 298
M. Nageshkumar and M.N. ShanmukhaSwamy
Quality Analysis of a Chaotic and Hopping Stream Based CipherImage 307
G.A. Sathishkumar, K. Bhoopathybagan, and N. Sriraam
Design Pattern Mining Using State Space Representation of GraphMatching 318
Manjari Gupta, Rajwant Singh Rao, Akshara Pande, andA.K. Tripathi
MST-Based Cluster Initialization for K-Means 329Damodar Reddy, Devender Mishra, and Prasanta K. Jana
Geometry and Skin Color Based Hybrid Approach for Face Tracking inColour Environment 339
Mahesh Goyani, Guam Shikkenawis, and Brijesh Joshi
Performance Analysis of Block and Non Block Based Approach ofInvisible Image Watermarking Using SVD in DCT Domain 348
Mahesh Goyani and Gunvantsinh Gohil
A Novel Topographic Feature Extraction Method for Indian CharacterImages 358
Soumen Bag and Gaurav Harit
XVIII Table of Contents - Part I
Comprehensive Framework to Human Recognition Using Palmprintand Speech Signal 368
Mahesh P.K. and ShanmukhaSwamy M.N.
Logical Modeling and Verification of a Strength Based Multi-agentArgumentation Scheme Using NuSMV 378
Shravan Shetty, H.S. Shashi Kiran, Murali Babu Namala, andSanjay Singh
Key Frame Detection Based Semantic Event Detection andClassification Using Heirarchical Approach for Cricket Sport VideoIndexing 388
Mahesh M. Goyani, Shreyash K. Dutta, and Payai Raj
Software Engineering
Towards a Software Component Quality Model 398Nitin Upadhyay, Bharat M. Despande, and Vishnu P. Agrawal
Colour Image Encryption Scheme Based on Permutation andSubstitution Techniques 413
Narendra K. Pareek, Vinod Patidar, and Krishan K. Sud
Deciphering the Main Research Themes of SoftwareValidation - A Bibliographical Study 428
Tsung Teng Chen, Yaw Han Chiu, and Yen Ping Chi
Toward a Comprehension View of Software Product Line 439Sami Ouali, Naoufel Kraiem, and Henda Ben Ghezala
Collecting the Inter Component Interactions in MultithreadedEnvironment 452
Arun Mishra, Alok Chaurasia, Pratik Bhadkoliya, and Arun Misra
On the Benefit of Quantification in AOP Systems - A Quantitative anda Qualitative Assessment 462
Kotrappa Sirbi and Prakash Jayanth Kulkarni
Empirical Measurements on the Convergence Nature of DifferentialEvolution Variants 472
G. Jeyakumar and C. Shanmugavelayutham
Database and Data Mining
An Intelligent System for Web Usage Data Preprocessing 481V.V.R. Maheswara Rao, V. Valli Kumari, and K.V.S.V.N. Raju
Table of Contents - Part I XIX
Discovery and High Availability of Services in Auto-load BalancedClusters 491
Shakti Mishra, Alok Mathur, Harit Agarwal, Rohit Vashishtha,D.S. Kushwaha, and A.K. Misra
Bayes Theorem and Information Gain Based Feature Selection forMaximizing the Performance of Classifiers 501
Subramanian Appavu, Ramasamy Rajaram, M. Nagammai,N. Priyanga, and S. Priyanka
Data Mining Technique for Knowledge Discovery from EngineeringMaterials Data Sets 512
Doreswamy, K.S. Hemanth, Channabasayya M. Vastrad, andS. Nagaraju
Mobile Database Cache Replacement Policies: LRU and PPRRP 523Hariram Chavan and Suneeta Sane
A Novel Data Mining Approach for Performance Improvement ofEBGM Based Face Recognition Engine to Handle Large Database 532
Soma Mitra, Suparna Parua, Apurba Das, and Debasis Mazumdar
Efficient Dens i ty B a s e d Ou t l i e r H a n d l i n g Techn ique in D a t a M i n i n g . . . . 542Krishna Gopal Sharma, Anant Ram, and Yashpal Singh
Hierarchical Clustering of Projected Data Streams Using ClusterValidity Index 551
Bharat Pardeshi and Durga Toshniwal
Non-Replicated Dynamic Fragment Allocation in Distributed DatabaseSystems 560
Nilarun Mukherjee
Soft Computing (AI, Neural Networks, FuzzySystems, etc.)
A Comparative Study of Machine Learning Algorithms as ExpertSystems in Medical Diagnosis (Asthma) 570
B.D.C.N. Prasad, P.E.S.N. Krishna Prasad, and Yeruva Sagar
Stabilization of Large Scale Linear Discrete-Time Systems by ReducedOrder Controllers 577
Sundarapandian Vaidyanathan and Kavitha Madhavan
Hybrid Synchronization of Hyperchaotic Qi and Lii Systems byNonlinear Control 585
Sundarapandian Vaidyanathan and Suresh Rasappan
XX Table of Contents - Part I
An Intelligent Automatic Story Generation System by RevisingProppian's System 594
Jay a A. and Uma G.V.
A Genetic Algorithm with Entropy Based Probabilistic Initializationand Memory for Automated Rule Mining 604
Saroj, Kapila, Dinesh Kumar, and Kanika
Author Index 615
Table of Contents - Part II
Networks and Communications
Analysis of Successive Interference Cancellation in CDMA Systems 1G.S. Deepthy and R.J. Susan
Scenario Based Performance Analysis of AODV and DSDV in MobileAdhoc Network 10
S. Taruna and G.N. Purohit
Web Service Based Sheltered Medi Helper 20Priya Loganathan, Jeyalakshmi Jeyabalan, and Usha Sarangapani
Reliable Neighbor Based Multipath Multicast Routing in MANETs 33Rajashekhar C. Biradar and Sunilkumar S. Manvi
Ad-Hoc On Demand Distance Vector Routing Algorithm UsingNeighbor Matrix Method in Static Ad-Hoc Networks 44
Aitha Nagaraju, G. Choran Kumar, and S. Ramachandram
Improving QoS for Ad-Hoc Wireless Networks Using PredictivePreemptive Local Route Repair Strategy 55
G.S. Sharvani, T.M. Rangaswamy, Aayush Goel, B. Ajith,Binod Kumar, and Manish Kumar
Improving Energy Efficiency in Wireless Sensor Network Using MobileSink 63
K. Deepak Samuel, S. Murali Krishnan, K. Yashwant Reddy, andK. Suganthi
Transformed Logistic Block Cipher Scheme for Image Encryption 70/. Shatheesh Sam, P. Devaraj, and R.S. Bhuvaneswaran
Context Management Using Ontology and Object Relational Database(ORDBMS) in a Pervasive Environment 79
B. Vanathi and V. Rhymend Uthariaraj
Path Optimization and Trusted Routing in MANET: An Interplaybetween Ordered Semirings 88
Kiran K. Somasundaram and John S. Baras
LEAD: Energy Efficient Protocol for Wireless Ad Hoc Networks 99Subhankar Mishra, Sudhansu Mohan Satpathy, and Abhipsa Mishra
XXII Table of Contents - Part II
Scale-Down Digital Video Broadcast Return Channel via Satellite(DVB-RCS) Hub 107
N.G. Vasantha Kumar, Mohanchur Sarkar, Vishal Agarwal,B.P. Chaniara, S.V. Mehta, V.S. Palsule, and K.S. Dasgupta
Reconfigurable Area and Speed Efficient Interpolator Using DALUTAlgorithm 117
Rajesh Mehra and Ravinder Kaur
Performance Evaluation of Fine Tuned Fuzzy Token Bucket Scheme forHigh Speed Networks 126
Anurag Aeron, C. Rama Krishna, and Mohan Lai
A Survey on Video Transmission Using Wireless Technology 137S.M. Koli, R.G. Purandare, S.P. Kshirsagar, and V.V. Gohokar
Cluster Localization of Sensor Nodes Using Learning MovementPatterns 148
R. Arthi and K. Murugan
Improving TCP Performance through Enhanced Path RecoveryNotification 158
S. Sathya Priya and K. Murugan
The Replication Attack in Wireless Sensor Networks: Analysis andDefenses 169
V. Manjula and C. Chellappan
New Distributed Initialization Protocols for IEEE 802.11 Based SingleHop Ad Hoc Networks 179
Rasmeet S. Bali and C. Rama Krishna
Deployment of GSM and RFID Technologies for Public Vehicle PositionTracking System 191
Apurv Vasal, Deepak Mishra, and Puneet Tandon
Type of Service, Power and Bandwidth Aware Routing Protocol forMANET 202
Divyanshu, Ruchita Goyal, and Manoj Mishra
Energy Efficiency in Wireless Network Using Modified DistributedEfficient Clustering Approach 215
Kaushik Chakraborty, Abhrajit Sengupta, and Himadri Nath Saha
ERBR: Enhanced and Improved Delay for Requirement Based Routingin Delay Tolerant Networks 223
Mohammad Arif, Kavita Satija, and Sachin Chaudhary
Table of Contents - Part II XXIII
Deterministic Approach for the Elimination of MED Oscillations andInconsistent Routing in BGP 233
Berlin Hency, Vasudha Venkatesh, and Raghavendran Nedunchezhian
Context Aware Mobile Initiated Handoff for Performance Improvementin IEEE 802.11 Networks 243
Abhijit Sarma, Shantanu Joshi, and Sukumar Nandi
Safety Information Gathering and Dissemination in Vehicular Ad hocNetworks: Cognitive Agent Based Approach 254
M.S. Kakkasageri and S.S. Manvi
Enhanced AODV Routing Protocol for Mobile Adhoc Networks 265K.R. Shobha and K. Rajanikanth
A Comparative Study of Feedforward Neural Network and SimplifiedFuzzy ARTMAP in the Context of Face Recognition 277
Antu Annam Thomas and M. Wilscy
A Multicast-Based Data Dissemination to Maintain Cache Consistencyin Mobile Environment 290
Kahkashan Tabassum and A. Damodaram
Quantitative Analysis of Dependability and Performability in Voiceand Data Networks 302
Almir P. Guimaräes, Paulo R.M. Maciel, and Rivalino Alatias Jr.
Rain Fade Calculation and Power Compensation for Ka-Band SpotBeam Satellite Communication in India 313
Jayadev Jena and Prasanna Kumar Sahu
Generalized N X N Network Concept for Location and MobilityManagement 321
C. Ashok Baburaj and K. Alagarsamy
A Weight Based Double Star Embedded Clustering of HomogeneousMobile Ad Hoc Networks Using Graph Theory 329
T.N. Janakiraman and A. Senthil Thilak
An Enhanced Secured Communication of MANET 340J. Thangakumar and M. Robert Masillamani
MIMO-OFDM Based Cognitive Radio for Modulation Recognition 349R. Deepa and K. Baskaran
Network and Communications Security
Mutual Authentication of RFID Tag with Multiple Readers 357Selwyn Piramuthu
XXIV Table of Contents - Part II
Design Space Exploration of Power Efficient Cache DesignTechniques 362
Ashish Kapania and E.V. Ravish Aradhya
Secured WiMAX Communication at 60 GHz Millimeter-Wave forRoad-Safety 372
Bera Rabindranath, Sarkar Subir Kumar, Sharma Bikash,Sur Samarendra Nath, Bhaskar Debasish, and Bera Soumyasree
A Light-Weight Protocol for Data Integrity and Authentication inWireless Sensor Networks 383
Jibi Abraham, Nagasimha M P, Mohnish Bhatt, and Chaitanya Naik
Intrusion Detection Using Flow-Based Analysis of Network Traffic 391Jisa David and Ciza Thomas
A Threshold Cryptography Based Authentication Scheme for MobileAd-hoc Network 400
Haimabati Dey and Raja Datta
Formal Verification of a Secure Mobile Banking Protocol 410Huy Hoang Ngo, Osama Dandash, Phu Dung Le,Bala Srinivasan, and Campbell Wilson
A Novel Highly Secured Session Based Data Encryption TechniqueUsing Robust Fingerprint Based Authentication 422
Tanmay Bhattacharya, Sirshendu Hore, Ay an Mukherjee, andS.R. Bhadra Chaudhuri
An Active Host-Based Detection Mechanism for ARP-RelatedAttacks 432
F.A. Barbhuiya, S. Roopa, R. Ratti, N. Hubballi, S. Biswas, A. Sur,S. Nandi, and V. Ramachandran
Privacy-Preserving Naïve Bayes Classification Using Trusted ThirdParty Computation over Vertically Partitioned Distributed ProgressiveSequential Data Streams 444
Keshavamurthy B.N. and Durga Toshniwal
Copyright Protection in Digital Multimedia 453Santosh Kumar, Sumit Kumar, and Sukumar Nandi
Trust as a Standard for E-Commerce Infrastructure 464Shabana and Mohammad Arif
A Scalable Rekeying Scheme for Secure Multicast in IEEE 802.16Network 472
Sandip Chakraborty, Soumyadip Majumder,Ferdous A. Barbhuiya, and Sukumar Nandi
Table of Contents - Part II XXV
Secure Data Aggregation in Wireless Sensor Networks Using PrivacyHomomorphism 482
M.K. Sandhya and K. Murugan
Deniable Encryption in Replacement of Untappable Channel to PreventCoercion 491
Jaydeep Howlader, Vivek Nair, and Saikat Basu
Author Identification of Email Forensic in Service OrientedArchitecture 502
Pushpendra Kumar Pateriya, Shivani Mishra, andShefalika Ghosh Samaddar
A Chaos Based Approach for Improving Non Linearity in S Box Designof Symmetric Key Cryptosystems 516
Jeyamala Chandrasekaran, B. Subramanyan, andRaman Selvanayagam
Implementation of Invisible Digital Watermarking by Embedding Datain Arithmetically Compressed Form into Image Using Variable-LengthKey 523
Samanta Sabyasachi and Dutta Saurabh
Wireless and Mobile Networks
Transmission Power Control in Virtual MIMO Wireless Sensor NetworkUsing Game Theoretic Approach 535
R. Valli and P. Dananjayan
Protocols for Network and Data Link Layer in WSNs: A Review andOpen Issues 546
Ankit Jain, Deepak Sharma, Mohit Goel, and A.K. Verma
Psychoacoustic Models for Heart Sounds 556Kiran Kumari Patil, B.S. Nagabhushan, and B.P. Vijay Kumar
Location Based GSM Marketing 564Sparsh Arora and Divya Bhatia
Inverse Square Law Based Solution for Data Aggregation RoutingUsing Survival Analysis in Wireless Sensor Networks 573
Khaja Muhaiyadeen A., Hari Narayanan R.,Shelton Paul Infant C, and Rajesh G.
System Implementation of Pushing the Battery Life and PerformanceInformation of an Internal Pacemaker to the Handheld Devices viaBluetooth Version 3.0 + H.S 584
Balasundaram Subbusundaram and Gayathri S.
XXVI Table of Contents - Part II
Cross-Layer Analyses of QoS Parameters in Wireless SensorNetworks 595
Alireza Masoum, Nirvana Meratnia, Arta Dilo,Zahra Taghikhaki, and Paul J.M. Havinga
Optimum Routing Approach vs. Least Overhead Routing Approach forMinimum Hop Routing in Mobile Ad hoc Networks 606
Natarajan Meghanathan
Architecture for High Density RFID Inventory System in Internet ofThings 617
Jain Atishay and Tanwer Ashish
A Relative Study of MANET and VANET: Its Applications,Broadcasting Approaches and Challenging Issues 627
Ajit Singh, Mukesh Kumar, Rahul Rishi, and D.K. Madan
Adaptive Threshold Based on Group Decisions for DistributedSpectrum Sensing in Cognitive Adhoc Networks 633
Rajagopal Sreenivasan, G. V.K. Sasirekha, and Jyotsna Bapat
A Distributed Mobility-Adaptive and Energy Driven ClusteringAlgorithm for MANETs Using Strong Degree 645
T.N. Janakiraman and A. Senthil Thilak
Dynamic Sink Placement in Wireless Sensor Networks 656Parisa D. Hossein Zadeh, Christian Schlegel, andMike H. MacGregor
Author Index 667