-
Article
Open AccessGenome-wide association study for single nucleotide polymorphism associated with mural and cumulus granulosa cells of PCOS (polycystic ovary syndrome) and non-PCOS patients
The genetic make-up of local granulosa cells and their function in the pathophysiology of polycystic ovary syndrome (PCOS) is crucial to a full comprehension of the disorder. The major purpose of this study wa...
-
Chapter and Conference Paper
Detection and Prevention of Black Hole Attack Using Trusted and Secure Routing in Wireless Sensor Network
A wireless sensor network (WSN) is a network of devices that can communicate after gathering information by monitoring any region through wireless links. Due to this delicate arrangement several numbers of att...
-
Chapter and Conference Paper
Lightweight Secure Routing Over Vehicular Ad Hoc Networks with Traffic Status
In today’s era, vehicular ad hoc network (VANET) is an interesting research area, due the dynamics that it brings. VANET is composed up of different nodes that exchange and transfer information among them and ...
-
Chapter and Conference Paper
Secure Multipath Routing for Efficient Load Balancing and Jamming Attack Protection
Mobile ad hoc network (MANET) brings simplicity and flexibility but also introduces constraints due to mobility, dynamic configuration, limited resources, and security. Security is among the most important lim...
-
Chapter and Conference Paper
Fuzzy Logic Based Packet Drop** Detection Approach for Mobile Ad-Hoc Wireless Network
Mobile ad hoc network (MANET) is a lively network that is self configuring in nature because of its mobility characteristics. MANET plays an important role in situations where fixed wired pre-defined backbone ...
-
Chapter and Conference Paper
An ANN-Based Text Mining Approach Over Hash Tag and Blogging Text Data
In the daily life, everybody keeps on using Internet after the waking up that includes the communication among different people of this world. On one side, Internet has made everyone’s life very convenient and...
-
Chapter and Conference Paper
Text Classification with K-Nearest Neighbors Algorithm Using Gain Ratio
Content classification is the errand of naturally arranging a lot of records into classifications from a predefined set. This implies that it allocates predefined classifications to free-content archives. This...
-
Chapter and Conference Paper
A Hybrid Approach for Intrusion Detection System
Intrusion detection concept plays a vital role in personal computer (PC) security design. Intrusion detection system (IDS) essentially fits in as a unit which monitors the user activities, incoming traffic, an...
-
Chapter and Conference Paper
An Ensemble Approach for Classification of Thyroid Using Machine Learning
Medical diagnosis and extracting patterns that can be converted into useful knowledge is a challenging work for researchers. Medical records are based on real-time data that have high dimensionality which make...
-
Chapter
NB Tree Based Intrusion Detection Technique Using Rough Set Theory Model
Security is an important need for any organization to establish trust and consequently prevents misuse. Intrusion detection system (IDS) is a defense mechanism that strives to differentiate between legitimate ...
-
Chapter and Conference Paper
A New Approach for Cloud Security Using Hybrid Querying System Over Cloud Scenario
Cloud computing is one of the most important and remarkable innovations of recent times. Since all the data is stored in servers located at different locations operating on different hardware so data consisten...
-
Chapter and Conference Paper
Distributed Multi-criteria Based Clusterhead Selection Approach for MANET
Ad-hoc networks play an important role in situations where fixed wired pre-defined backbone cannot be created. In mobile adhoc network (MANET), discovery of routing path with minimum routing and control overhe...
-
Chapter and Conference Paper
Congestion Control Network Coding Scheme in Delay-Tolerant Network
Delay-tolerant network (DTN) allows nodes to follow, store, and forward packets through different delivery mechanisms. These data bundles are created by sender to send data to multiple destinations. DTN suppor...
-
Chapter and Conference Paper
Dominant and LBP-Based Content Image Retrieval Using Combination of Color, Shape and Texture Features
Content-based image retrieval based on color, texture and shape are important concepts that facilitate quick user interaction. Due to these reasons, humongous amount of explores in this direction has been done...
-
Chapter and Conference Paper
Weight-Based Secure Approach for Identifying Selfishness Behavior of Node in MANET
Mobile adhoc networks (MANET) is an interesting concept, as all mobile nodes work like router. They can receive and transmit data packet any time in hostile environment even when the source and the destination...
-
Chapter and Conference Paper
A New Neural Network-Based IDS for Cloud Computing
Services provided by cloud computing are the very fascinating as it offers of free access or paid access to the buyers. This paradigm facilitates a verity of facets to the users. Being such an interesting conc...