Volume-6 ~ Issue-3
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Artificial Intelligence Algorithms |
Country | : | India |
Authors | : | Sreekanth Reddy Kallem |
: | 10.9790/0661-0630108 | |
Abstract:Artificial intelligence (AI) is the study of how to make computers do things which, at the moment,
people do better. Thus Strong AI claims that in near future we will be surrounded by such kinds of machine
which can completely works like human being and machine could have human level intelligence. One intention
of this article is to excite a broader AI audience about abstract algorithmic information theory concepts, and
conversely to inform theorists about exciting applications to AI.The science of Artificial Intelligence (AI) might
be defined as the construction of intelligent systems and their analysis.
Keywords: Artificial Intelligence, Algorithms
Keywords: Artificial Intelligence, Algorithms
[1] http://www.hutter1.net/ai/uaibook.html.
[2] Elaine Rich, Kevin Knight, " Artificial Intelligence", Second Edition, page no.3.
[3] " Universal Artificial Intelligence"Subtitle: Sequential Decisions based on Algorithmic Probability.
[4] http://en.wikipedia.org/wiki/Artificial_intelligence.
[5] http://www.codeproject.com/Articles/16286/AI-Simple-Genetic-Algorithm-GA-to-solve-a-card-pro.
[6] http://artint.info/html/ArtInt_51.html.
[7] David Poole,AlanMackworth, "Artificial Intelligence: Foundations of Computational Agents",2010.
[8] http://www.kirupa.com/forum/showthread.php?72863-Tutorial-Path-Finding-Algorithms-AI.
[9] http://webdocs.cs.ualberta.ca/~lanctot/files/papers/pathfinding-orbius-2006.pdf.
[10] http://en.wikipedia.org/wiki/A*_search_algorithm.
[2] Elaine Rich, Kevin Knight, " Artificial Intelligence", Second Edition, page no.3.
[3] " Universal Artificial Intelligence"Subtitle: Sequential Decisions based on Algorithmic Probability.
[4] http://en.wikipedia.org/wiki/Artificial_intelligence.
[5] http://www.codeproject.com/Articles/16286/AI-Simple-Genetic-Algorithm-GA-to-solve-a-card-pro.
[6] http://artint.info/html/ArtInt_51.html.
[7] David Poole,AlanMackworth, "Artificial Intelligence: Foundations of Computational Agents",2010.
[8] http://www.kirupa.com/forum/showthread.php?72863-Tutorial-Path-Finding-Algorithms-AI.
[9] http://webdocs.cs.ualberta.ca/~lanctot/files/papers/pathfinding-orbius-2006.pdf.
[10] http://en.wikipedia.org/wiki/A*_search_algorithm.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Wireless Micro-Sensor Network Models |
Country | : | India |
Authors | : | Ms. Swapnali S. Maske, Mrs. Tejaswini A. Pawar |
: | 10.9790/0661-0630914 | |
Abstract:Wireless sensor network is important in sensing, Collecting and disseminating information about
environmental Phenomenon. This paper contain emerging field to classify wireless micro sensor network
according to different communication functions, data delivery models and network dynamics. This taxonomy
will aid in defining appropriate communication infra structure for diff. sensor network application subspaces. It
allows network designer to choose the Protocol architecture. According to their application this taxonomy will
enable new sensor network models to define for use in further research in this area. The overall communication
behavior in a wireless micro sensor Network is application driven. It is useful to decouple the application
communication used for information dissemination from the infrastructure communication used to configure
and optimize the Network. This separation will aid network designers in selecting the appropriate sensor
network architecture that will best match the characteristics of the communication traffic of a given application.
[1] Sameer Tilak, Nael B, Abu-Ghazaleh and Wendi Heizelmn,"A Taxonomy of Wireless Micro Sensor Network Models",
[2] Sameer Tilak, Nael B, Abu-Ghazaleh and Wendi Heizelmn ," The Updatesd A Taxonomy of Wireless Micro Sensor Network
Models",ACM And Mobile Computing Review, April 2002,Volume 1,Number 2.
[2] Sameer Tilak, Nael B, Abu-Ghazaleh and Wendi Heizelmn ," The Updatesd A Taxonomy of Wireless Micro Sensor Network
Models",ACM And Mobile Computing Review, April 2002,Volume 1,Number 2.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mobile Networking and Ad hoc routing protocols validation |
Country | : | India |
Authors | : | Simanta Sarma, Dr. Sarbananda Das |
: | 10.9790/0661-0631524 | |
Abstract:In this paper we describe mobile network and efficient routing protocol for wireless ad hoc networks.
We report on its implementation, on performance comparisons and on a formal validation result. Moreover we
discuss Cellular system design, global System for mobile Communication, Formal Protocol Verification and
operating over infrared or Bluetooth. This paper evaluates two model checking tools, SPIN and UPPAAL, using
the verification of the Ad hoc Routing protocol as a case study. Insights are reported in terms of identifying
important modeling considerations and the types of ad hoc protocol properties that can realistically be verified
Keywords:Cellular Phone network, mobile ad hoc networks, routing protocols, Wireless networks, ad hoc routing, routing protocol Implementation, formal validation, model checking, Infrared or Bluetooth, GSM.
Keywords:Cellular Phone network, mobile ad hoc networks, routing protocols, Wireless networks, ad hoc routing, routing protocol Implementation, formal validation, model checking, Infrared or Bluetooth, GSM.
[1] Bin Li, Lizhong Li, Bo Li and Xi-Ren Cao, "On Handoff Performance for an Integrated Voice/Data Cellular System", Journal of
Wireless Networks 9,393-402,2003
[2] Marcos A. C. Lima, Aluizio F.R. Araújo, and Amílcar C. César , "Dynamic channel assignment in mobile communications
based on genetic algorithm", 0-7803-7589-0/02 2002 IEEE
[3] Somnath Sinha Maha Patra, "Improved Genetic algorithm for channel allocation scheme with channel borrowing in Mobile
Computing", IEEE Transactions on Mobile Computing, vol-5, No.7, July 2006.
[4] Arup Acharya, Archan Misra and Sorav Bansal. .A Label-switching Packet Forwarding architecture for Multi-hop Wireless LANs.
[5] Proc WoWMoM'02, Sep 2002, Atlanta, USA Lundgren, H.: Implementation and Real-world Evaluation of Routing Protocols for
Wireless Ad hoc Networks. Licentiate thesis, Uppsala University (2002)
[6] IETF MANET Working Group: MANET charter. http://www.ietf.org/html. charters/manet-charter.html (2004
[7] Perkins, C., Belding-Royer, E., Das, S.: Request for Comments: Ad hoc on-demand distance vector (AODV) routing.
http://www.ietf.org/rfc/rfc3561.txt (2003).
[8] Johnson, D.B., Maltz, D.A., Hu, Y.C.: Internet draft: The dynamic source routing protocol for mobile ad hoc networks (DSR).
http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09.txt (2003).
[9] Xiong, C., Murata, T., Tsai, J.: Modelling and simulation of routing protocol for mobile ad hoc networks using coloured Petri nets.
In: Proc. Workshop on Formal Methods Applied to Defence Systems in Formal Methods in Software Engineering and Defence
Systems. (2002)
[10] Tian-Tsair SutS, Po-Chiun Huangt, and Chung-Ju Changt,"A channel borrowing protection scheme for handoffs in a cellular
based pcs system" , 0-7803-2955-4/95/ IEEE
Wireless Networks 9,393-402,2003
[2] Marcos A. C. Lima, Aluizio F.R. Araújo, and Amílcar C. César , "Dynamic channel assignment in mobile communications
based on genetic algorithm", 0-7803-7589-0/02 2002 IEEE
[3] Somnath Sinha Maha Patra, "Improved Genetic algorithm for channel allocation scheme with channel borrowing in Mobile
Computing", IEEE Transactions on Mobile Computing, vol-5, No.7, July 2006.
[4] Arup Acharya, Archan Misra and Sorav Bansal. .A Label-switching Packet Forwarding architecture for Multi-hop Wireless LANs.
[5] Proc WoWMoM'02, Sep 2002, Atlanta, USA Lundgren, H.: Implementation and Real-world Evaluation of Routing Protocols for
Wireless Ad hoc Networks. Licentiate thesis, Uppsala University (2002)
[6] IETF MANET Working Group: MANET charter. http://www.ietf.org/html. charters/manet-charter.html (2004
[7] Perkins, C., Belding-Royer, E., Das, S.: Request for Comments: Ad hoc on-demand distance vector (AODV) routing.
http://www.ietf.org/rfc/rfc3561.txt (2003).
[8] Johnson, D.B., Maltz, D.A., Hu, Y.C.: Internet draft: The dynamic source routing protocol for mobile ad hoc networks (DSR).
http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09.txt (2003).
[9] Xiong, C., Murata, T., Tsai, J.: Modelling and simulation of routing protocol for mobile ad hoc networks using coloured Petri nets.
In: Proc. Workshop on Formal Methods Applied to Defence Systems in Formal Methods in Software Engineering and Defence
Systems. (2002)
[10] Tian-Tsair SutS, Po-Chiun Huangt, and Chung-Ju Changt,"A channel borrowing protection scheme for handoffs in a cellular
based pcs system" , 0-7803-2955-4/95/ IEEE
- Citation
- Abstract
- Reference
- Full PDF
Abstract:In a connection-oriented system, shared firewall protection provides the identical stage of protection
against on its own firewall failures as dedicated firewall protection, with potentially superior network
exploitation. This document lists the Constraints of firewall placement strategies and proposes a heuristic
routing algorithm for communal security provisioning. Simulations be conducted to confirm the algorithm and
to balance network utilization of shared firewall protection to that of devoted fortification.
Key words: Firewall, Network Security, intrusion, route discovery
Key words: Firewall, Network Security, intrusion, route discovery
[1] A. Rubin, D. Geer, and M. Ranum, Web Security Sourcebook. Wiley Computer Publishing, 1997.
[2] S. Hinrichs and S. Chen, "Network Management Based on Policies," Proc. SPIE Multimedia Computing and Networking Conf.,
Jan. 2000.
[3] J. Wack, K. Cutler, and J. Pole, Guidelines on Firewalls and Firewall Policy. Nat'l Inst. of Standards and Technology, Jan. 2002 .
[4] Y. Bartal, A. Mayer, K. Nissim, and A. Wool, "Firmato: A Novel Firewall Management Toolkit," ACM Trans. Computer Systems,
vol. 22, no. 4, pp. 381-420, Nov. 2004.
[5] A. Wool, "A Quantitative Study of Firewall Configuration Errors," Computer, vol. 37, no. 6, pp. 62 -67, June 2004.
[6] H. Court, Knutsford, and Cheshire, "High-Availability: Technology Brief Firewall Load Balancing," High-Availability.Com,
http://www.High-Availability.Com, 2003.
[7] "Firewall Load Balancing," Nortel Networks, www.nortel.com, 2009.
[8] "Check Point Firewall-1 Guide," Check Point, www.checkpoint. com, 2009.
[9] T.H. Cormen, C.E. Leiserson, R.L. Rivest, and C. Stein, Introduction to Algorithms. MIT Press, 2003.
[10] M.G. Gouda and A.X. Liu, "Firewall Design: Consistency, Completeness and Compactness," Proc. Int'l Conf. Distributed
Computing Systems (ICDCS '04), pp. 320-327, Mar. 2004.
[2] S. Hinrichs and S. Chen, "Network Management Based on Policies," Proc. SPIE Multimedia Computing and Networking Conf.,
Jan. 2000.
[3] J. Wack, K. Cutler, and J. Pole, Guidelines on Firewalls and Firewall Policy. Nat'l Inst. of Standards and Technology, Jan. 2002 .
[4] Y. Bartal, A. Mayer, K. Nissim, and A. Wool, "Firmato: A Novel Firewall Management Toolkit," ACM Trans. Computer Systems,
vol. 22, no. 4, pp. 381-420, Nov. 2004.
[5] A. Wool, "A Quantitative Study of Firewall Configuration Errors," Computer, vol. 37, no. 6, pp. 62 -67, June 2004.
[6] H. Court, Knutsford, and Cheshire, "High-Availability: Technology Brief Firewall Load Balancing," High-Availability.Com,
http://www.High-Availability.Com, 2003.
[7] "Firewall Load Balancing," Nortel Networks, www.nortel.com, 2009.
[8] "Check Point Firewall-1 Guide," Check Point, www.checkpoint. com, 2009.
[9] T.H. Cormen, C.E. Leiserson, R.L. Rivest, and C. Stein, Introduction to Algorithms. MIT Press, 2003.
[10] M.G. Gouda and A.X. Liu, "Firewall Design: Consistency, Completeness and Compactness," Proc. Int'l Conf. Distributed
Computing Systems (ICDCS '04), pp. 320-327, Mar. 2004.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | "Performance analysis of Data Mining algorithms in Weka" |
Country | : | India |
Authors | : | Mahendra Tiwari, Manu Bhai Jha, OmPrakash Yadav |
: | 10.9790/0661-0633241 | |
Abstract:The retail industry collects vast amounts of data on sales, customer buying history, goods, and
service with ease of use of modern computing technology. This paper elaborates the use of data mining
technique to help retailers to identify customer profile for a retail store and behaviors, improve better customer
satisfaction and retention. The aim is to judge the accuracy of different data mining algorithms on various data
sets. The performance analysis depends on many factors encompassing test mode, different nature of data sets,
and size of data set.
Key words:data mining, performance, analysis, retail
Key words:data mining, performance, analysis, retail
[1] www.boirefillergroup.com/....KDD_CONFERENCE_PAPER_AUG2006.pdf
[2] www.dcc.fc.up.pt/~ricroc/aulas/0708/atdmlp/material/paper_dmbiz06.pdf
[3] www.ecmlpkdd2006.org/ws-pdmaec.pdf
[4] http://www.linkedin.com/in/federicocesconi
[5] www.linkedin.com/in/federicocesconi
[6] C. Ling and C. Li, (1998 ) "Data mining for direct marketing: Problem and solutions," in Proc, of the 4 th international Conference
on Knowledge Discovery & Data Mining, pp. 73-79
[7] John, F., Elder iv and Dean W.(1998) A comparison of leading data mining tools, fourth International conference on Knowledge
discovery and data mining pp.1-31
[8] Michel A., et all (1998), Evaluation of fourteen desktop data mining tools , pp 1-6
[9] Kleissner, C.(1998),, data mining for the enterprise, Proceeding of the 31st annual Hawaii International conference on system
science
[10] Brijs, T., Swinnen, G.,(1999), using association rules for product assortment decisions: A case study., Data Mining and knowledge
discovery 254.
[2] www.dcc.fc.up.pt/~ricroc/aulas/0708/atdmlp/material/paper_dmbiz06.pdf
[3] www.ecmlpkdd2006.org/ws-pdmaec.pdf
[4] http://www.linkedin.com/in/federicocesconi
[5] www.linkedin.com/in/federicocesconi
[6] C. Ling and C. Li, (1998 ) "Data mining for direct marketing: Problem and solutions," in Proc, of the 4 th international Conference
on Knowledge Discovery & Data Mining, pp. 73-79
[7] John, F., Elder iv and Dean W.(1998) A comparison of leading data mining tools, fourth International conference on Knowledge
discovery and data mining pp.1-31
[8] Michel A., et all (1998), Evaluation of fourteen desktop data mining tools , pp 1-6
[9] Kleissner, C.(1998),, data mining for the enterprise, Proceeding of the 31st annual Hawaii International conference on system
science
[10] Brijs, T., Swinnen, G.,(1999), using association rules for product assortment decisions: A case study., Data Mining and knowledge
discovery 254.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:Here during this document A MAC layer stage overloading detection system has been foreseeable.
The planned model aims to share out associate degree energy competent mechanism to calculate the degree of
congestion at victim node with maximal accuracy. This block detection tool is incorporated with a sequence
Crosslayered obstruction management Routing Topology. The projected model involves hard of congestion in 2
steps with effectual energy capable congestion detection and most favorable consumption of possessions. Packet
loss in network routing is principally because of link failure and congestion. Most of the procurable congestion
manages solutions don't have the flexibility to differentiate between packet loss owing to association collapse
and packet loss unpaid to congestion. As a consequence these explanations aim towards exploiting against
packet drop owing to link breaks down that could be a redundant endeavor and may turn out in defeat of
resources. The opposite aspect within the majority of the simple to urge to resolve is that the consumption of
power and resources to tell the apart jamming state, the amount of congestion and alert the premise node
concerning congestion in routing path. Here during this document we tend to propose a cross lined model of
congestion recognition and manage mechanism that contain power economical congestion discovery, Grouplevel
Congestion Prediction (GCP) and Group-level Egress Permanence(GEP) algorithms that could work in
sequence for congestion detection and manage model. This paper includes explorations and simulation results
that demonstrate the increased store consumption, power potency in congestion discovery and congestion
management is probable by the projected topology.
Keywords: quality of service, cross-layer protocols, multimedia communication, Low-power design, multicast routing
Keywords: quality of service, cross-layer protocols, multimedia communication, Low-power design, multicast routing
[1] C.S.R. Murthy and B.S. Manoj, Ad Hoc Wireless Networks: Architectures and Protocols. Prentice Hall, 2004.
[2] J. Janssen, D.D. Vleeschauwer, G.H. Petit, R. Windey, and J.M. Leroy, "Delay Bounds for Voice over IP Calls Transported over
Satellite Access Links," Mobile Networks and Applications, vol. 7, pp. 79 -89, 2002.
[3] B. Tavli and W. Heinzelman, Mobile Ad Hoc Networks: Energy- Efficient Real-Time Group Communications. Springer, 2006.
[4] C.W. Wu and Y.C. Tay, "AMRIS: A Multicast Protocol for Ad Hoc Wireless Networks," Proc. IEEE Military Comm. Conf., vol. 1,
pp. 25-29, 1999.
[5] S.J. Lee, W. Su, and M. Gerla, "On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks," Mobile
Networks and Applications, vol. 7, pp. 441-453, 2002.
[6] V. Kawadia and P.R. Kumar, "A Cautionary Perspective on Cross- Layer Design," IEEE Wireless Comm., vol. 12, no. 1, pp. 3-11,
Feb. 2005.
[7] J.G. Jetcheva and D.B. Johnson, "Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks," Proc.
ACM Int‟l Symp. Mobile Ad Hoc Networking and Computing, pp. 33-44, 2001.
[8] Mohammad M. Qabajeh, Aisha Hashim, Othman Khalifa & Liana K. Qabajeh, 2010, "Geographical Multicast Quality of Service
Routing Protocol for Mobile Ad-Hoc Networks", Journal of Engineering Letters, Vol. 18, No. 3, pp. 212-225.
[9] W. Liang, "Approximate Minimum-Energy Multicasting in Wireless Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 5,
no. 4, pp. 377-387, Apr. 2006.
[10] B. Tavli and W. Heinzelman, "TRACE: Time Reservation Using Adaptive Control for Energy Efficiency," IEEE J. Selected Areas
Comm., vol. 21, no. 10, pp. 1506-1515, Dec. 2003.
[2] J. Janssen, D.D. Vleeschauwer, G.H. Petit, R. Windey, and J.M. Leroy, "Delay Bounds for Voice over IP Calls Transported over
Satellite Access Links," Mobile Networks and Applications, vol. 7, pp. 79 -89, 2002.
[3] B. Tavli and W. Heinzelman, Mobile Ad Hoc Networks: Energy- Efficient Real-Time Group Communications. Springer, 2006.
[4] C.W. Wu and Y.C. Tay, "AMRIS: A Multicast Protocol for Ad Hoc Wireless Networks," Proc. IEEE Military Comm. Conf., vol. 1,
pp. 25-29, 1999.
[5] S.J. Lee, W. Su, and M. Gerla, "On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks," Mobile
Networks and Applications, vol. 7, pp. 441-453, 2002.
[6] V. Kawadia and P.R. Kumar, "A Cautionary Perspective on Cross- Layer Design," IEEE Wireless Comm., vol. 12, no. 1, pp. 3-11,
Feb. 2005.
[7] J.G. Jetcheva and D.B. Johnson, "Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks," Proc.
ACM Int‟l Symp. Mobile Ad Hoc Networking and Computing, pp. 33-44, 2001.
[8] Mohammad M. Qabajeh, Aisha Hashim, Othman Khalifa & Liana K. Qabajeh, 2010, "Geographical Multicast Quality of Service
Routing Protocol for Mobile Ad-Hoc Networks", Journal of Engineering Letters, Vol. 18, No. 3, pp. 212-225.
[9] W. Liang, "Approximate Minimum-Energy Multicasting in Wireless Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 5,
no. 4, pp. 377-387, Apr. 2006.
[10] B. Tavli and W. Heinzelman, "TRACE: Time Reservation Using Adaptive Control for Energy Efficiency," IEEE J. Selected Areas
Comm., vol. 21, no. 10, pp. 1506-1515, Dec. 2003.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security in MANET based on PKI using fuzzy function |
Country | : | Egypt |
Authors | : | I.M.Hanafy, A.A.Salama, M. Abdelfttah, Y. M.Wazery |
: | 10.9790/0661-0635258 | |
Abstract:In Mobile Adhoc Network the design of security model is a very critical and essential topic, this is
due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while
handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security scheme is proposed
based on Public Key infrastructure for distributing session keys between nodes. The length of those keys is
decided using fuzzy logic manipulation for the discrimination between some of the attacks applied over this kind
of networks. The proposed algorithm of Security-model is an adaptive fuzzy logic based algorithm that can
adapt itself with the dynamic conditions of mobile hosts. Experimental results show that the use of fuzzy based
security can enhance the security of mobile adhoc networks.
Key words:MANET; Security; wireless; Communication; fuzzy; PKI; KNN
Key words:MANET; Security; wireless; Communication; fuzzy; PKI; KNN
[1.] Balakrishnan, V. Varadharajan, U. K. Tupakula, and P.Lucs, "Trust Integrated Cooperation Architecture for Mobile Ad-hoc
Networks". Proceedings of 4th IEEE International Symposium on Wireless Communication Systems (ISWCS 2007), Trondheim,
Norway, 2007.
[2.] AW. Stallings; ―Cryptography and Network Security – Principles and Practice‖, 9th Edition; Prentice Hall 2010
[3.] Dr.A.Rajaram, S.Vaithiya lingam. ― Distributed Adaptive Clustering Algorithm for Improving Data Accessibility in MANET‖.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011
[4.] S. Balachandran, D. Dasgupta and L. Wang. ― Hybrid Approach for Misbehavior Detection in Wireless Ad -Hoc Networks‖.
Published in Symposium on Information Assurance, New York, June 14-15, 2006.
[5.] A.Rajaram, S.Palaniswami .‖ THE MODIFIED SECURITY SCHEME FOR DATA INTEGRITY IN MANET‖. International
Journal of Engineering Science and Technology. Vol. 2(7), 2010, 3111-3119
[6.] C Balakrishnan, V. Varadharajan, U. K. Tupakula, and P.Lucs, "Trust Integrated Cooperation Architecture for Mobile Ad-hoc
Networks". Proceedings of 4th IEEE International Symposium on Wireless Communication Systems (ISWCS 2007), Trondheim,
Norway, 2007.
[7.] A. Srinivasan, J. Teitelbaum, H. Liang, J. Wu, and M. Cardei, "Reputation and Trust-Based Systems for Ad-hoc and Sensor
Networks," Algorithms and Protocols for Wireless Ad-hoc and Sensor Networks, A. Boukerche (ed.), Wiley & Sons, 2011.
[8.] K.Seshadri Ramana et al.‖ Trust Based Security Routing in Mobile Adhoc Networks‖, (IJCSE) International Journal on Computer
Science and Engineering Vol. 02, No. 02, 2010, pp 259-263.
[9.] Yan L. Sun, Wei Yu, ‖Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks‖, 2006 IEEE,
pp305-317
[10.] Er. Banita Chadhaa, Er. Zatin Gupta,‖ Security Architecture for Mobile Adhoc Networks‖ (IJAEST) INTERNATIONAL
JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 9, 2011, pp 101 – 104
Networks". Proceedings of 4th IEEE International Symposium on Wireless Communication Systems (ISWCS 2007), Trondheim,
Norway, 2007.
[2.] AW. Stallings; ―Cryptography and Network Security – Principles and Practice‖, 9th Edition; Prentice Hall 2010
[3.] Dr.A.Rajaram, S.Vaithiya lingam. ― Distributed Adaptive Clustering Algorithm for Improving Data Accessibility in MANET‖.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011
[4.] S. Balachandran, D. Dasgupta and L. Wang. ― Hybrid Approach for Misbehavior Detection in Wireless Ad -Hoc Networks‖.
Published in Symposium on Information Assurance, New York, June 14-15, 2006.
[5.] A.Rajaram, S.Palaniswami .‖ THE MODIFIED SECURITY SCHEME FOR DATA INTEGRITY IN MANET‖. International
Journal of Engineering Science and Technology. Vol. 2(7), 2010, 3111-3119
[6.] C Balakrishnan, V. Varadharajan, U. K. Tupakula, and P.Lucs, "Trust Integrated Cooperation Architecture for Mobile Ad-hoc
Networks". Proceedings of 4th IEEE International Symposium on Wireless Communication Systems (ISWCS 2007), Trondheim,
Norway, 2007.
[7.] A. Srinivasan, J. Teitelbaum, H. Liang, J. Wu, and M. Cardei, "Reputation and Trust-Based Systems for Ad-hoc and Sensor
Networks," Algorithms and Protocols for Wireless Ad-hoc and Sensor Networks, A. Boukerche (ed.), Wiley & Sons, 2011.
[8.] K.Seshadri Ramana et al.‖ Trust Based Security Routing in Mobile Adhoc Networks‖, (IJCSE) International Journal on Computer
Science and Engineering Vol. 02, No. 02, 2010, pp 259-263.
[9.] Yan L. Sun, Wei Yu, ‖Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks‖, 2006 IEEE,
pp305-317
[10.] Er. Banita Chadhaa, Er. Zatin Gupta,‖ Security Architecture for Mobile Adhoc Networks‖ (IJAEST) INTERNATIONAL
JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 9, 2011, pp 101 – 104