![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
A Comprehensive Analysis of Machine Learning- and Deep Learning-Based Solutions for DDoS Attack Detection in SDN
Software-defined networking (SDN) provides programmability, manageability, flexibility and efficiency compared to traditional networks. These are owing to the SDN’s mutual independence or separation of the con...
-
Article
ONOS DDoS Defender: A Comparative Analysis of Existing DDoS Attack Datasets using Ensemble Approach
Software-Defined Networking (SDN) outperforms conventional networks in terms of programmability, management, flexibility, and efficiency. This is because SDN separates the control and data planes. The centrali...
-
Article
Publish/Subscribe-Based P2P-Cloud of Underutilized Computing Resources for Providing Computation-as-a-Service
The recent advancement in electronic devices and communication technology has lead to explosion in the digital data. These vast data have created ample opportunities to increase revenue and reduce costs, but c...
-
Chapter and Conference Paper
Large Scale P2P Cloud of Underutilized Computing Resources for Providing MapReduce as a Service
In today’s world, data is growing at an unprecedented rate. This vast amount of data brings in the challenge of efficient storage and processing. The common solution adopted by organizations is to hire the ser...
-
Article
Balancing energy consumption across network for maximizing lifetime in cluster-based wireless sensor network
For any wireless sensor network to be useful, it is imperative that the constituent nodes are able to conserve energy and yet forward data so as to enhance network lifetime. In a sensor network where the sensi...
-
Chapter and Conference Paper
An Accurate and Self-correcting Localization Algorithm for UWSN Using Anchor Nodes of Varying Communication Range
Precise event detection in underwater wireless sensor network requires the position information of the detecting sensor nodes. Manual positioning of nodes in such a network is highly infeasible. The popular di...
-
Chapter and Conference Paper
Robust and Distributed Range-Free Localization Using Anchor Nodes with Varying Communication Range for Three Dimensional Wireless Sensor Networks
Localization of the nodes in a sensor network is a premier activity which influences the performance of the network. The data collected by a sensor node may become useless if the location of that node is not k...
-
Chapter and Conference Paper
On Optimal Space Tessellation with Deterministic Deployment for Coverage in Three-Dimensional Wireless Sensor Networks
Coverage is one of the fundamental issues in Wireless Sensor Networks. It reflects how well the service volume is monitored or tracked by its participant sensors. Sensing ranges of nodes are assumed to be of s...
-
Chapter and Conference Paper
A New Top-Down Hierarchical Multi-hop Routing Protocol for Wireless Sensor Networks
This paper proposes a new top-down hierarchical, multi-hop, routing protocol for the wireless sensor networks. The proposed solution is appropriate for random deployment and suitable for different sizes of tar...
-
Chapter and Conference Paper
Hasslefree: Simplified Access Control Management for XML Documents
In this article we propose an approach which simplifies the task of DBAs in specifying the access constraints on a XML document. In the proposed methodology, for enforcing a security policy on a XML document, ...
-
Chapter and Conference Paper
Secure Data Management in Reactive Sensor Networks
A wireless sensor network (WSN), an ad hoc network of resource constrained sensor nodes, has become an attractive option for monitoring applications. The wide use of sensor networks is due to the cheap hardwar...
-
Chapter and Conference Paper
BUSTRAP – An Efficient Travel Planner for Metropolitans
In this paper, we are providing a solution for an efficient and up-to-date commuting planner for a public transport system used by masses. Here, we present design and implementation features of a proposed syst...
-
Chapter and Conference Paper
An Extension to ER Model for Top-Down Semantic Modeling of Databases of Applications
An extension to ER (Entity Relationship) model for semantic modeling of databases in top down manner is presented. The model proposes a new entity type called composite entity type and a table based meta construc...
-
Chapter and Conference Paper
Path Stability Based Adaptation of MANET Routing Protocols
This paper proposes adaptation of Mobile Ad-hoc Network (MANET) [13] routing protocols taking stability of links as primary consideration. The presented scheme can be associated with a resource reservation str...
-
Chapter and Conference Paper
Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks
In this paper, we propose a new transaction model, named as Team Transaction for distributed, cooperative computing on mobile ad hoc networks. The proposed model captures the mobility and distributive properties ...
-
Article
Monoclonal antibody raised against envelope glycoprotein peptide neutralizes Japanese encephalitis virus
Epitopes on envelope glycoprotein of Indian strain of Japanese encephalitis virus were delineated by prediction methods. Monoclonal antibodies (MAb) raised against a putative B cell epitope peptide, reacted w...
-
Chapter
The Questacon Story
I might never have got into the interactive science centre industry if it had not been for the infamous American Senator Joe McCarthy.
-
Article
Interferon (type-α and γ) production by fresh and cryopreserved human mononuclear cells
A comparative study of interferon (IFN) production (type-α and γ) was carried out using Ficoll-hypaque purified fresh and cryopreserved mononuclear cells from eight normal healthy individuals. Newcastle diseas...