Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528543
A. K. Kemalkar, V. Bairagi
This paper presents a no-reference image quality assessment, targeted towards blur distortions based on the study of human blur perception for varying contrast values. A probabilistic framework is developed based on the sensitivity of human blur perception at different contrasts. Utilizing this framework, the probability of detecting blur at each edge in an image is estimated. The blur perception information at each edge is then pooled over the entire image to obtain a final quality score by evaluating the cumulative probability of blur detection. Proposed metric is able to predict relative amount of blurriness in images. Higher metric value represent less blurred image. Results are provided to illustrate the performance of proposed metric. Performance of proposed metric is compared with existing no reference image quality metric for various publically available image databases.
{"title":"A no-reference image quality assessment","authors":"A. K. Kemalkar, V. Bairagi","doi":"10.1109/ICE-CCN.2013.6528543","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528543","url":null,"abstract":"This paper presents a no-reference image quality assessment, targeted towards blur distortions based on the study of human blur perception for varying contrast values. A probabilistic framework is developed based on the sensitivity of human blur perception at different contrasts. Utilizing this framework, the probability of detecting blur at each edge in an image is estimated. The blur perception information at each edge is then pooled over the entire image to obtain a final quality score by evaluating the cumulative probability of blur detection. Proposed metric is able to predict relative amount of blurriness in images. Higher metric value represent less blurred image. Results are provided to illustrate the performance of proposed metric. Performance of proposed metric is compared with existing no reference image quality metric for various publically available image databases.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122219455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528524
P. Swarnalatha, B. Tripathy
This study plays a vital role in the significance of the analysis of an image in medical image processing field, is gaining thought of many researchers in modern times. The recognition of faults present in the destroyed portion of an image is imperative for based field. In this paper, we focus at developing an approach for better classification of medical images. Our methodology is based on the concept of a novel fuzzy approach with bit plane (FCMBP) algorithm. The bit plane filtering method is used to slice the given image for classification to find out the destroyed region of the given image. The sliced image should be normalized with the old techniques and compared with the fuzzy technique for better classification and cluster of the spoiled portion. Thereby the control points have been extracted that are needed for further reconstruction of images. The performance of fuzzy approach with bit plane technique is evaluated using simulation and it is proved that our approach yields better results when compared to accessible methods.
{"title":"A novel fuzzy c-means approach with bit plane algorithm for classification of medical images","authors":"P. Swarnalatha, B. Tripathy","doi":"10.1109/ICE-CCN.2013.6528524","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528524","url":null,"abstract":"This study plays a vital role in the significance of the analysis of an image in medical image processing field, is gaining thought of many researchers in modern times. The recognition of faults present in the destroyed portion of an image is imperative for based field. In this paper, we focus at developing an approach for better classification of medical images. Our methodology is based on the concept of a novel fuzzy approach with bit plane (FCMBP) algorithm. The bit plane filtering method is used to slice the given image for classification to find out the destroyed region of the given image. The sliced image should be normalized with the old techniques and compared with the fuzzy technique for better classification and cluster of the spoiled portion. Thereby the control points have been extracted that are needed for further reconstruction of images. The performance of fuzzy approach with bit plane technique is evaluated using simulation and it is proved that our approach yields better results when compared to accessible methods.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126395362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528566
P. G. Angaitkar, K. Saxena, N. Gupta, Amit Sinhal
Roof Leakage is the major problem faced in almost all buildings irrespective of the age of the building. Basically, roof leak is caused because of the different conditions and material used in construction. But most of the time these leakages are so small that we cannot see with bare eyes. That's why infrared cameras are used for detecting roof leaks. Based on the images captured by infrared cameras, edge map is drawn and that particular area is repaired. Because of the thermal nature of the infrared image, we cannot see edges perfectly which makes us to use approximation of an edge. This leads to the wastage of the material used in repairing the roof leaks which in turn increases the cost of repair also. This paper presents a technique of infrared image enhancement for roof leakage detection. This technique combines the benefits of homomorphic image processing and the additive wavelet transform. The idea behind this technique is to decompose the image into three sub bands in an additive fashion using an additive wavelet transform. The homomorphic processing is performed on each sub band, separately. The homomorphic processing transforms the image into illumination and reflectance components. Butterworth filter is used to enhance the reflection and illumination components in the image, separately. Finally, an inverse additive wavelet transform is performed on the homomorphic enhanced sub bands to get an infrared image with better visual details as well as edge map.
{"title":"Enhancement of infrared image for roof leakage detection","authors":"P. G. Angaitkar, K. Saxena, N. Gupta, Amit Sinhal","doi":"10.1109/ICE-CCN.2013.6528566","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528566","url":null,"abstract":"Roof Leakage is the major problem faced in almost all buildings irrespective of the age of the building. Basically, roof leak is caused because of the different conditions and material used in construction. But most of the time these leakages are so small that we cannot see with bare eyes. That's why infrared cameras are used for detecting roof leaks. Based on the images captured by infrared cameras, edge map is drawn and that particular area is repaired. Because of the thermal nature of the infrared image, we cannot see edges perfectly which makes us to use approximation of an edge. This leads to the wastage of the material used in repairing the roof leaks which in turn increases the cost of repair also. This paper presents a technique of infrared image enhancement for roof leakage detection. This technique combines the benefits of homomorphic image processing and the additive wavelet transform. The idea behind this technique is to decompose the image into three sub bands in an additive fashion using an additive wavelet transform. The homomorphic processing is performed on each sub band, separately. The homomorphic processing transforms the image into illumination and reflectance components. Butterworth filter is used to enhance the reflection and illumination components in the image, separately. Finally, an inverse additive wavelet transform is performed on the homomorphic enhanced sub bands to get an infrared image with better visual details as well as edge map.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125700666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528561
B. Bhowmik, K. Dutta, N. Banerjee, A. Hazra, P. Bhattacharyya
Thin film Sol-gel grown nano TiO2 based resistive sensor was developed to detect acetone at low temperature. Structural characterization were carried out using XRD, FESEM and AFM to ensure the crystalline, grain size and surface roughness of the TiO2 thin film and anatase phase TiO2 having particle size in order of 10 to 20 nm with average roughness 100nm. The thin film with catalytic Pd contact were investigated for acetone vapor sensing in the range of 150-250°C for acetone concentration 500-1500 ppm with N2 as carrier gas. The maximum response 178 % approximately was obtained at the optimum temperature of 150oC for 500 ppm acetone. The dynamic range of the sensor was also found to be quite appreciable (500-1500 ppm). The response and recovery time 42s and 44s respectively was recorded at 500 ppm at optimum temperature. The short term stability study indicated that the sensor is appreciably stable with a nominal baseline drift of ±6 %.
{"title":"Low temperature acetone sensor based on Sol-gel grown nano TiO2 thin film","authors":"B. Bhowmik, K. Dutta, N. Banerjee, A. Hazra, P. Bhattacharyya","doi":"10.1109/ICE-CCN.2013.6528561","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528561","url":null,"abstract":"Thin film Sol-gel grown nano TiO2 based resistive sensor was developed to detect acetone at low temperature. Structural characterization were carried out using XRD, FESEM and AFM to ensure the crystalline, grain size and surface roughness of the TiO2 thin film and anatase phase TiO2 having particle size in order of 10 to 20 nm with average roughness 100nm. The thin film with catalytic Pd contact were investigated for acetone vapor sensing in the range of 150-250°C for acetone concentration 500-1500 ppm with N2 as carrier gas. The maximum response 178 % approximately was obtained at the optimum temperature of 150oC for 500 ppm acetone. The dynamic range of the sensor was also found to be quite appreciable (500-1500 ppm). The response and recovery time 42s and 44s respectively was recorded at 500 ppm at optimum temperature. The short term stability study indicated that the sensor is appreciably stable with a nominal baseline drift of ±6 %.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131161728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528490
V. Chandra, Prasad S Maheswari
Digital image capturing, processing and distribution has showed a remarkable growth over recent years. This media content is sometimes distributed in encrypted format and watermarking of these media items for proof of ownership, media authentication needs to be carried out in encrypted domain to improve image security. Therefore it is sometimes necessary to embed watermark in encrypted media items for ownership declaration or copyright management purposes. DRM system is one such example where there is a challenge to watermark these encrypted data as the encryption would have randomized the incoming data. In this paper, a block cipher called AES-128 bit key encryption algorithm and DCT combined with DWT based watermarking algorithm to watermark the encrypted image were proposed which increases robustness of the watermark. These method embeds the binary watermark in encrypted image and decryption is done after extraction of watermark.
{"title":"Robust watermarking of AES encrypted images for DRM systems","authors":"V. Chandra, Prasad S Maheswari","doi":"10.1109/ICE-CCN.2013.6528490","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528490","url":null,"abstract":"Digital image capturing, processing and distribution has showed a remarkable growth over recent years. This media content is sometimes distributed in encrypted format and watermarking of these media items for proof of ownership, media authentication needs to be carried out in encrypted domain to improve image security. Therefore it is sometimes necessary to embed watermark in encrypted media items for ownership declaration or copyright management purposes. DRM system is one such example where there is a challenge to watermark these encrypted data as the encryption would have randomized the incoming data. In this paper, a block cipher called AES-128 bit key encryption algorithm and DCT combined with DWT based watermarking algorithm to watermark the encrypted image were proposed which increases robustness of the watermark. These method embeds the binary watermark in encrypted image and decryption is done after extraction of watermark.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133608309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528588
P. Malarvezhi, R. Kumar
The Systems using Orthogonal Frequency Division Multiplexing (OFDM) suffer with carrier frequency offset (CFO) and phase noise which results in inter carrier interference (ICI) due to which there will be large performance degradation. The impairments like CFO and phase noise are caused due to mismatch of carrier frequency at the transmitter to local oscillator frequency at the receiver, multipath and Doppler shift. This paper presents a modified preamble structure based approach for CFO and phase noise compensation in an OFDM systems which mitigate the effect of inter carrier interference and its equivalent energy loss. Theoretical analysis and simulation results substantiate the importance and advantages of proposed CFO and phase noise compensation approach. This proposed method provides a considerable signal to noise ratio gain on bit error rate performance.
{"title":"A modified preamble structure based carrier frequency offset (CFO) and phase noise compensation in an OFDM system","authors":"P. Malarvezhi, R. Kumar","doi":"10.1109/ICE-CCN.2013.6528588","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528588","url":null,"abstract":"The Systems using Orthogonal Frequency Division Multiplexing (OFDM) suffer with carrier frequency offset (CFO) and phase noise which results in inter carrier interference (ICI) due to which there will be large performance degradation. The impairments like CFO and phase noise are caused due to mismatch of carrier frequency at the transmitter to local oscillator frequency at the receiver, multipath and Doppler shift. This paper presents a modified preamble structure based approach for CFO and phase noise compensation in an OFDM systems which mitigate the effect of inter carrier interference and its equivalent energy loss. Theoretical analysis and simulation results substantiate the importance and advantages of proposed CFO and phase noise compensation approach. This proposed method provides a considerable signal to noise ratio gain on bit error rate performance.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528572
C. Divya, N. Krishnan, P. Krishnapriya
A wireless sensor network consists of inexpensive power constrained sensors which collect data from the environment and transmit them towards the base station in a cooperative way. Reducing the energy and extending the wireless sensor networks lifetime, imposes a great confront. In this paper, the distributed Energy efficient clustering protocol was used to calculate the energy efficiency of the network. Existing DEEC was modified and developed a new protocol called MDEEC. MDEEC allows more number of data to be sent from the base station to the cluster head in a particular time interval. Compared to DEEC, MDEEC performs less delay for sending the data, thereby increasing the energy efficiency of the heterogeneous network.
{"title":"Modified distributed energy-efficient cluster for heterogeneous wireless sensor networks","authors":"C. Divya, N. Krishnan, P. Krishnapriya","doi":"10.1109/ICE-CCN.2013.6528572","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528572","url":null,"abstract":"A wireless sensor network consists of inexpensive power constrained sensors which collect data from the environment and transmit them towards the base station in a cooperative way. Reducing the energy and extending the wireless sensor networks lifetime, imposes a great confront. In this paper, the distributed Energy efficient clustering protocol was used to calculate the energy efficiency of the network. Existing DEEC was modified and developed a new protocol called MDEEC. MDEEC allows more number of data to be sent from the base station to the cluster head in a particular time interval. Compared to DEEC, MDEEC performs less delay for sending the data, thereby increasing the energy efficiency of the heterogeneous network.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114523204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528533
R. Renuka, V. Kavitha
Optical networks are a logical choice to meet the future communication demands, with optical fiber links offering huge bandwidth. OBS avoids the use of optical buffering and optical processing logic unlike in OPS but still achieves switching in optical domain. The OBS framework has been widely used in past years, for recent work use Optical Burst Chain switching (OBCS) to achieve high performance. Here switching unit is burst chain it consist of non-periodic bursts in one wavelength. We present extensive simulation result for throughput, delay and energy to demonstrate its superior performance over OBS networks.
{"title":"OBCS: High performance burst transmission for achieving energy consumption","authors":"R. Renuka, V. Kavitha","doi":"10.1109/ICE-CCN.2013.6528533","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528533","url":null,"abstract":"Optical networks are a logical choice to meet the future communication demands, with optical fiber links offering huge bandwidth. OBS avoids the use of optical buffering and optical processing logic unlike in OPS but still achieves switching in optical domain. The OBS framework has been widely used in past years, for recent work use Optical Burst Chain switching (OBCS) to achieve high performance. Here switching unit is burst chain it consist of non-periodic bursts in one wavelength. We present extensive simulation result for throughput, delay and energy to demonstrate its superior performance over OBS networks.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128332796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528472
B. Geevarghese, J. Thomas, M. Anil, A. Francis
This paper attempts to show the effects of pre-processing in bit error rate of neural network interference cancellation in spread spectrum receivers. Multiple access interference (MAI) which is one of the primary issues in CDMA multiuser detection is combated by interference cancellers. Feed-Forward Neural Networks with back propagation is used for interference cancellers. The works shows that pre-processing can bring adequate improvement in bit error rate as well as complexity.
{"title":"Pre-processed back propagation neural networks for CDMA interference cancellation","authors":"B. Geevarghese, J. Thomas, M. Anil, A. Francis","doi":"10.1109/ICE-CCN.2013.6528472","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528472","url":null,"abstract":"This paper attempts to show the effects of pre-processing in bit error rate of neural network interference cancellation in spread spectrum receivers. Multiple access interference (MAI) which is one of the primary issues in CDMA multiuser detection is combated by interference cancellers. Feed-Forward Neural Networks with back propagation is used for interference cancellers. The works shows that pre-processing can bring adequate improvement in bit error rate as well as complexity.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128096292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528486
R. Dorus, P. Vinoth
Wireless networks, intentional interference can be used as a launch pad for mounting Denial-of-Service in the network. Intentional interference (jamming) attacks can be performed by absorption of packets and discard them or drop the packets. Intrusion Detection System can be used to mitigate and prevent the jamming attack and the addition of cryptographic primitive used to preserve integrity of the packets. This paper proposes a mechanism for preventing jamming attacks on wireless networks-examine the detection efficiency of jamming attack and communication overhead of the wireless network using proactive and reactive protocols. RSA algorithm is used for providing data packets integrity information during wireless transmission. Through simulation and performance analysis, the implemented prevention mechanism and the integrity preservation provides higher packet delivery ratio in proactive routing protocol (OLSR) than reactive routing protocol (AODV).
{"title":"Mitigation of jamming attacks in wireless networks","authors":"R. Dorus, P. Vinoth","doi":"10.1109/ICE-CCN.2013.6528486","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528486","url":null,"abstract":"Wireless networks, intentional interference can be used as a launch pad for mounting Denial-of-Service in the network. Intentional interference (jamming) attacks can be performed by absorption of packets and discard them or drop the packets. Intrusion Detection System can be used to mitigate and prevent the jamming attack and the addition of cryptographic primitive used to preserve integrity of the packets. This paper proposes a mechanism for preventing jamming attacks on wireless networks-examine the detection efficiency of jamming attack and communication overhead of the wireless network using proactive and reactive protocols. RSA algorithm is used for providing data packets integrity information during wireless transmission. Through simulation and performance analysis, the implemented prevention mechanism and the integrity preservation provides higher packet delivery ratio in proactive routing protocol (OLSR) than reactive routing protocol (AODV).","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122047682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}