Keywords:
Artificial intelligence-Congresses.
;
Computational intelligence-Congresses.
;
Electronic books.
Type of Medium:
Online Resource
Pages:
1 online resource (566 pages)
Edition:
1st ed.
ISBN:
9789811086366
Series Statement:
Advances in Intelligent Systems and Computing Series ; v.708
URL:
https://ebookcentral.proquest.com/lib/geomar/detail.action?docID=5592859
DDC:
006.3
Language:
English
Note:
Intro -- Foreword -- Message from the General Chairs Dr. Modi Chirag Navinchandra and Dr. Pankaj Kumar Sa -- Preface -- In Memoriam: Prof. S. K. Jena (1954-2017) -- Committee: ICACNI 2017 -- Advisory Board Members -- Chief Patron -- Patron -- General Chairs -- Organizing Co-chairs -- Program Co-chairs -- Technical Program Committee -- Organizing Committee -- Contents -- About the Editors -- Research on Optical Networks, Wireless Sensor Networks, VANETs, and MANETs -- 1 Multichannel Assignment Algorithm for Minimizing Imbalanced Channel Utilization in Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Model and Problem Definition -- 2.1 Network Model and Assumptions -- 2.2 Problem Definition -- 3 Proposed Multichannel Assignment Algorithm -- 3.1 Phase I: Root Selection -- 3.2 Phase II: Node Ordering -- 3.3 Phase III: Channel Selection -- 4 Results and Discussion -- 5 Conclusions -- References -- MWPR: Minimal Weighted Path Routing Algorithm for Network on Chip -- 1 Introduction -- 2 Related Work -- 3 Virtual Channel(VC) Router Architecture -- 4 Minimal Weighted Path Routing Algorithm (MWPR): -- 5 Experimental Results -- 6 Conclusion -- References -- 3 An IoT-VANET-Based Traffic Management System for Emergency Vehicles in a Smart City -- Abstract -- 1 Introduction -- 2 State-of-the-Art Reviews -- 3 Proposed Framework Model -- 4 Proposed Solution -- 5 Implementation and Results -- 6 Conclusion and Future Work -- References -- 4 Analysis of Wormhole Attacks in Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Wormhole Attacks -- 3 Comparison of Wormhole Attack Modes -- 4 Detection Mechanism Analysis -- 4.1 Using Location Information -- 4.2 Using Neighborhood Information -- 4.3 Using Hop Count/Distance -- 4.4 Using Time Information -- 4.5 Using Connectivity Information -- 5 Security Comparison of Various Approaches -- 6 Conclusion.
,
Acknowledgements -- References -- 5 Handover Latency Improvement and Packet Loss Reduction in Wireless Networks Using Scanning Algorithm -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Performance Evaluation -- 5 Conclusion and Future Scope -- References -- 6 Optimized Location for On-Body Sink for PRPLC Protocol in WBAN -- Abstract -- 1 Introduction -- 2 Probabilistic Routing with Postural Link Cost (PRPLC) -- 3 Simulation Parameters -- 4 Results and Discussion -- 5 Conclusion -- Acknowledgements -- References -- A Machine Learning Approach to Find the Optimal Routes Through Analysis of GPS Traces of Mobile City Traffic -- 1 Introduction -- 2 Architecture of the Proposed Framework -- 2.1 GPS Data Pre-processing -- 2.2 Analysis of Traffic Condition -- 2.3 Traffic Congestion Computation -- 2.4 Road-Segment Graph Analysis -- 3 Experimentation -- 3.1 Data set -- 3.2 Results and Discussion -- 4 Conclusion and Future Work -- References -- Zigbee-Based Wearable Device for Elderly Health Monitoring with Fall Detection -- 1 Introduction -- 2 Methodology -- 3 Fall Detection Algorithm-Threshold Based -- 3.1 Threshold Selection -- 4 Fall Detection Algorithm-Artificial Neural Network -- 4.1 Feature Extraction -- 4.2 Feature Maps -- 5 Results and Analysis -- 5.1 Threshold Approach -- 5.2 Neural Network Approach -- 6 Conclusion and Future Work -- 7 Declaration -- References -- A Colored Petri Net Based Modeling and Analysis of Packet Dropping Scenario for Wireless Network -- 1 Introduction -- 2 Background -- 3 Proposed Model -- 4 Formal Definition -- 5 Simulation Using CPN Tools -- 6 Performance Analysis -- 7 Conclusion -- References -- 10 Hole Detection in Wireless Sensor Network: A Review -- Abstract -- 1 Introduction -- 2 Overview of Hole -- 3 Category of Holes in WSN -- 4 Algorithms for Hole Detection -- 5 Summarization.
,
6 Conclusion -- References -- A Two-Tailed Chain Topology in Wireless Sensor Networks for Efficient Monitoring of Food Grain Storage -- 1 Introduction -- 2 Survey of WSN Topologies -- 3 Issues in Food Grain Depots -- 3.1 Infrastructure Details of Food Grain Depot -- 4 Suitability of Existing Topologies -- 5 Proposed Work -- 5.1 Energy-Efficient Data Collection Mechanism -- 6 Analysis -- 6.1 Number of Sensor Nodes Required -- 6.2 Energy Consumption -- 6.3 Node Failure -- 7 Simulation and Results -- 8 Conclusion -- References -- 12 Designing an Adaptive Vehicular Density-Based Traffic Signal Controlling System -- Abstract -- 1 Introduction -- 2 Existing Traffic Monitoring and Signal Processing Systems -- 3 Proposed Approach -- 3.1 Video Preprocessing -- 3.2 Object Detection -- 3.3 Control Algorithm -- 4 Conclusions -- References -- 13 Moving Object Detection and Tracking in Traffic Surveillance Video Sequences -- Abstract -- 1 Introduction -- 2 Proposed Variance-Based Method for Multiple Object Detection -- 2.1 Five-Frame Difference Method -- 2.2 Five-Frame Background Subtraction Method -- 2.3 Binarization and Morphological Operation -- 2.4 Variance Calculation -- 3 Simulation Results and Discussion -- 3.1 True-False Analysis and Algorithm Comparison -- 3.2 Reconstructed Images and the Bar Chart Representation of Simulated Results -- 4 Conclusion -- References -- 14 Dynamic Distance-Based Cluster Head Election for Maximizing Efficiency in Wireless Sensor Networks Using Artificial Neural Networks -- Abstract -- 1 Introduction -- 2 Literature Review on ANN-Based Networking with WSN -- 3 Proposed System Model -- 3.1 Algorithm for Dynamic Cluster Head Election-Based on Shortest Distance Factor Using ANN -- 3.1.1 Assumptions -- 3.1.2 Algorithm -- 3.2 Energy and Throughput Profile for Proposed System with Number of Nodes -- 4 Conclusion and Future Scope.
,
References -- Implementation of FPGA-Based Network Synchronization Using IEEE 1588 Precision Time Protocol (PTP) -- 1 Introduction -- 1.1 IEEE1588 Precision Time Protocol (PTP) -- 2 System Description -- 2.1 FPGA-Based Implementation of PTP Protocol -- 2.2 Follow_Up PTP Packet Is Not Required in FPGA-Based Implementation -- 2.3 High Precision of Accuracy Can Be Achieved Using VHDL/VERILOG on FPGA-Based Platform -- 3 Test Methodology and Results -- 4 Conclusion -- References -- 16 A Cloud-Based Intelligent Transportation System's Framework to Support Advanced Traveler Information Systems -- Abstract -- 1 Introduction -- 2 Advanced Traveler Information Systems (ATISs) -- 3 Cloud-Based Intelligent Transportation Systems (CITSs) -- 4 A Generic Framework for Cloud-Based ITS -- 4.1 A Novel Framework for CITS -- 4.2 Information Flow Diagram Description -- 5 Challenges of CITS -- 6 Conclusion -- References -- Communication Systems, Antenna Research, and Cognitive Radio, Signal Processing -- Statistical-Based Dynamic Radio Resource Allocation for Sectored Cells in MIMO-OFDMA System -- 1 Introduction -- 2 System Model -- 3 Frequency Planning -- 4 Resource Allocation -- 4.1 Subcarrier Allocation -- 4.2 Power Allocation -- 5 Discussion of Results -- 6 Conclusion -- References -- Classification of Protein Sequences by Means of an Ensemble Classifier with an Improved Feature Selection Strategy -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Building Knowledge Base -- 3.2 Segmentation -- 3.3 Incremental Classifier Selection Strategy -- 3.4 Feature Selection -- 4 Results and Analysis -- 5 Conclusion and Future Work -- References -- 19 Spectrum Aware-Based Distributed Handover Algorithm in Cognitive Radio Network -- Abstract -- 1 Introduction -- 2 System Model -- 3 Proposed Algorithm -- 3.1 Switching Algorithm with Description.
,
3.2 Next Channel Selection Algorithm with Description -- 4 Simulation Results -- 5 Conclusion -- References -- A Reputation-Based Trust Management Model in Multi-hop Cognitive Radio Networks -- 1 Introduction -- 2 Background and Related Work -- 3 Proposed Model -- 3.1 Proposed Algorithms -- 4 Performance Evaluation -- 5 Security Observations -- 5.1 Modification Attack -- 5.2 Replay Attack -- 5.3 Man-in-the-Middle Attack -- 6 Conclusion -- References -- 21 A Study: Various NP-Hard Problems in VLSI and the Need for Biologically Inspired Heuristics -- Abstract -- 1 Introduction -- 2 NP-Hard Problems -- 3 NP-Hard Problems in VLSI -- 3.1 Area Minimization -- 3.2 Wirelength Minimization -- 3.3 Dead Space Minimization -- 3.4 Via Minimization -- 3.5 Multi-objective Problems -- 4 Bio-Inspired Heuristics -- 4.1 Genetic Algorithm -- 4.2 Particle Swarm Optimization -- 4.3 Ant Colony Optimization -- 4.4 Clonal Selection (CS) Algorithm -- 5 Results and Tabulation -- 5.1 Simulation Platform Details -- 5.2 Benchmark Circuits -- 5.3 As SOO Problem -- 5.4 As MOO Problem -- 6 Conclusion -- References -- ESMGB: Efficient and Secure Modified Group-Based AKA Protocol for Maritime Communication Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed ESMGB-AKA Protocol -- 3.1 Group Formation and Initialization -- 3.2 Registration Phase -- 3.3 Authentication and Key Agreement Phase -- 4 Formal Verification and Security Analysis of Proposed Protocol -- 4.1 Formal Verification Using AVISPA Tool -- 4.2 Security Analysis of Proposed Protocol -- 5 Performance Analysis of Proposed Protocol -- 6 Conclusion and Future Work -- References -- 23 Reduced Latency Square-Root Calculation for Signal Processing Using Radix-4 Hyperbolic CORDIC -- Abstract -- 1 Introduction -- 2 CORDIC Algorithms -- 3 Proposed Architecture for Radix '4' Hyperbolic CORDIC Algorithm.
,
4 Results of Implementation in FPGA.
Permalink