دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1st ed. 2017] نویسندگان: Suresh Chandra Satapathy (editor), Vikrant Bhateja (editor), K. Srujan Raju (editor), B. Janakiramaiah (editor) سری: Lecture Notes in Networks and Systems, 5; 5 ISBN (شابک) : 9811032254, 9789811032257 ناشر: Springer سال نشر: 2017 تعداد صفحات: 654 [620] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 18 Mb
در صورت تبدیل فایل کتاب Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب ارتباطات کامپیوتری، شبکه و امنیت اینترنت: مجموعه مقالات IC3T 2016 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Organising Committee Patrons Organising Committee Local Organising Committee Contents Editors and Contributors 1 Approach Towards Increasing Efficiency of Communication Protocol in Wireless Sensor Network Using Modified Routing Protocol Abstract 1 Introduction 2 Related Work 3 Neural LEACH and M-Gear 4 M-Gear 5 Test Results and Comparison 6 Conclusion References 2 Anomaly Detection System in a Cluster Based MANET Abstract 1 Introduction 2 Related Work 3 AODV (Adhoc On-Demand Distance Vector) 4 The Proposed Method 5 Experimental Results 5.1 Simulation Scenario 5.2 Summary of Results 6 Conclusions References 3 Temperature Data Transfer Using Visible Light Communication Abstract 1 Introduction 2 Related Works 3 Proposed Temperature Data Transfer Using VLC System 3.1 Temperature Sensing and VLC Transmitting Procedure 3.2 LOS Channel Model 3.3 VLC Receiving Procedure 4 Experimental Testing and Results Discussion 4.1 Room Temperature Data Transmission Using VLC 4.1.1 First Test 4.1.2 Second Test 4.1.3 Third Test 4.2 Body Temperature Monitoring and Data Transmission Using VLC 5 Conclusion and Future Work References 4 A New Approach for Data Security in Cryptography and Steganography Abstract 1 Introduction 2 Proposed Method 2.1 Encoding Message 2.2 Hiding the Encoded Message into an Image 3 Results and Discussion 3.1 At Sender Side 3.2 At Receiver Side 3.3 Avalanche Effect 4 Conclusion References 5 Improvement of Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network Abstract 1 Introduction 2 Related Work 3 Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network 4 Proposed Protocol 5 Simulation and Analysis 6 Conclusion and Future Scope References 6 Computational and Emotional Linguistic Distance and Language Learning Abstract 1 Introduction 2 Linguistic Distance 3 Computational Linguistics 3.1 Approaches to Computational Linguistics 3.2 Speech Recognition Systems 4 Computational Linguistic Distance References 7 Collaborative Attack Effect Against Table-Driven Routing Protocols for WANETs: A Performance Analysis Abstract 1 Introduction 2 Related Work 3 Overview of Routing Protocols 3.1 Proactive Routing Protocols 3.1.1 Destination-Sequenced Distance-Vector (DSDV) Routing Protocol 3.1.2 Optimized Link State Routing (OLSR) Routing Protocol 3.2 Performance Assessment of Proactive Routing Protocols 3.2.1 Assessment of DSDV and OLSR Routing Protocol 4 Modelling Collaborative Attack Against Adhoc Routing Protocols 5 Simulation Results and Performance Analysis 6 Conclusion and Future Work References 8 Body Biased High Speed Full Adder to LNCS/LNAI/LNBI Proceedings Abstract 1 Introduction 2 Literature Survey 2.1 CCMOS 28 Transistor Full Adder 2.2 GDI Full Adder 2.3 MG-GDI Full Adder 2.4 Low Power High Speed Hybrid Full Adder 2.5 High Speed GLBB Technique 3 Proposed System 3.1 Modified XNOR Module 3.2 Carry Generation Module 3.3 Design of the Proposed Full Adder 3.4 Elimination of Glitches 3.5 Body Biased LPHS Full Adder with 8 Bit Input 4 Results and Discussions 4.1 Results Analysis 4.2 Simulation Results 5 Conclusion Acknowledgements References 9 Optimization of Contiguous Link Scheduling Abstract 1 Introduction 2 Related Work 3 Proposed Optimized Contiguous Link Scheduling Algorithm 3.1 Algorithm 4 Results and Analysis 5 Conclusion Acknowledgements References 10 A Novel Reversible EX-NOR SV Gate and Its Application Abstract 1 Introduction 2 Preview of Reversible Logic Gates 3 Proposed Design 3.1 2 × 2 Reversible EXNOR (SV) Gate 3.2 2 × 2 Reversible EXNOR (SV) Gate Based Equivalence Checker 4 Results and Discussions 5 Conclusion References 11 Internet of Things and Wireless Physical Layer Security: A Survey Abstract 1 Introduction 2 Motivation 3 IoT Concepts 3.1 IoT Elements 3.2 IoT Architecture 3.3 IoT Communication Standards 4 Wireless Network Security 4.1 OSI Model for Wireless Systems: Attacks and Security Approach 4.2 Wireless Physical Layer Security 4.3 IoT and WPLS Methods 5 Conclusion Acknowledgements References 12 Privacy Preservation in Cloud Computing with Double Encryption Method Abstract 1 Introduction 2 Related Work 3 Problem Formulation 4 Proposed Methodologies 4.1 Algorithm to Store Data 4.2 Algorithm to Access Data 5 Results and Discussion 5.1 Security Measures for Data Storing 5.2 Security Measures for Data Access 6 Conclusion and Future Scope References 13 A Machine Learning Based Approach for Opinion Mining on Social Network Data Abstract 1 Introduction 2 Background and Related Work 3 Methodology 3.1 Data Collection 3.2 Preprocessing and Stemming 3.3 Feature Vector 3.4 Machine Learning Techniques 4 Results and Discussion 5 Conclusion References 14 Congestion Control Mechanism for Real Time Traffic in Mobile Adhoc Networks Abstract 1 Introduction 2 Related Work 3 Analysis of Congestion Control Issues in Real Time Scenario 4 The Proposed Approach 5 Simulation and Results 6 Conclusion and Future Work References 15 Correction of Ocular Artifacts from EEG by DWT with an Improved Thresholding Abstract 1 Introduction 2 Methodology 2.1 Data Acquisition 2.2 Existing and Proposed Thresholding Method 2.3 Performance Evaluation 3 Results and Discussions 4 Conclusions References 16 EGRP: Enhanced Geographical Routing Protocol for Vehicular Adhoc Networks Abstract 1 Introduction 2 Related Work 3 Proposed Work 3.1 Determining Distance 3.2 Determining the Moving Direction 3.3 Predicting the Current Position of the Vehicles 4 Performance Evaluation 4.1 Simulation Setup 4.2 Performance Metrics 4.3 Experimental Results 5 Conclusion Acknowledgements References 17 PAPR Performance Analysis of Unitary Transforms in SLM-OFDM for WLAN 802.11a Mobile Terminals Abstract 1 Introduction 2 Precoded SLM-OFDM 3 Phase Sequence Set 4 Unitary Precoding Transform 4.1 Discrete Cosine Transforms 4.2 COSHAD Transform 5 Simulation Results 6 Conclusion References 18 Optimal Sensing Time Allocation for Energy Efficient Data Transmission in Amplify-Forward Cognitive Relay Assisted Network Abstract 1 Introduction 2 Description of System Exemplary 3 Optimal Sensing Time (OST) Analysis 4 Result Analysis 5 Conclusion References 19 Data Privacy in Online Shopping Abstract 1 Introduction 1.1 Literature Survey 2 Problem Statement 3 Proposed Methodology 3.1 K Anonymity 3.2 L Diversity 4 Results 4.1 Membership Disclosure Protection 4.2 Homogeneity Attack 5 Conclusion References 20 Design and Performance of Resonant Spacing Linear Patch Array with Quarter Wave Transformer Feed Network for Wireless Applications Abstract 1 Introduction 2 Design of Feed Network for an Array 3 Design Consideration 4 Results and Discussion 4.1 Results of 1 × 4 RMPA Array 5 Conclusion References 21 Performance Analysis of PUEA and SSDF Attacks in Cognitive Radio Networks Abstract 1 Introduction 2 System Model 3 Results and Discussions 4 Conclusion References 22 Design of a 3.4 GHz Wide-Tuning-Range VCO in 0.18 µm CMOS Abstract 1 Introduction 2 VCO Types 2.1 Current-Starved Inverter 2.2 Differential Pair with PFET Loads 3 Proposed Differential Ring VCO 4 Simulation Results 5 Conclusion References 23 A New Iterative Hybrid Edge Technique Using Image Mosaic Abstract 1 Introduction 2 Related Work 3 Proposed System 3.1 Diffe Hellman Key Exchange Protocol 3.2 Reverse Binary XOR Algorithm 3.3 Least Significant Bit Technique 3.4 Edge Based Image Mosaic Technique 4 Experimental Results 5 Conclusion References 24 Time Series Analysis of Oceanographic Data Using Clustering Algorithms Abstract 1 Introduction 1.1 Related Work 2 Proposed Work with Block Diagram 2.1 Clustering Algorithms 2.1.1 K-Means Algorithm 2.1.2 Complexity 2.1.3 DBSCAN Algorithm 3 Data 4 Experimantal Results 5 Conclusions 5.1 Future Work Acknowledgements References 25 Cluster Based Prediction of Keyword Query Over Databases Abstract 1 Introduction 2 Existing System 2.1 Problem Identification 3 Proposed System 3.1 Preprocessing Document Text 3.2 Construction of MVS Matrix 3.3 Grouping Related Documents Using K Means Clustering Algorithm 3.4 Character Shuffle Preprocessing Searching Process 4 Implementatıon Results 5 Conclusion References 26 An Efficient Data Encryption Through Image via Prime Order Symmetric Key and Bit Shuffle Technique Abstract 1 Introduction 2 One-Time Padding, AES, RSA 3 Proposed System 3.1 Prime Order Symmetric Key Algorithm 3.2 Data Hide into Image 3.3 Bit Shuffle Encryption Technique 3.4 Compression and Decompression Image 4 Experimental Result 5 Conclusion References 27 Peak Detection and Correlation Analysis in Noisy Time Series Data Abstract 1 Introduction 1.1 Flow Chart of Proposed Work 2 Smoothening and Data Validation 3 Algorithm 3.1 Simple Peak-Finding Algorithm 4 Correlation Analysis 5 Experimental Results 5.1 Detection of Peaks 5.2 Results of Correlation Analysis 5.2.1 Long-Term Variation 6 Conclusion Acknowledgements References 28 Novel Hash Based Key Generation for Stream Cipher in Cloud Abstract 1 Introduction 2 Cloud Computing Security Concerns 2.1 Security Issues in Cloud 2.2 Information Security Requirements 3 Related Work 4 Proposed Method 4.1 Key Generation 4.2 Encryption 4.3 Decryption 5 Experimental Results 6 Conclusion References 29 PSNM: An Algorithm for Detecting Duplicates in Oceanographic Data Abstract 1 Introduction 2 PSNM Algorithm 3 Data Validation 4 Flow Chart of Duplicate Detection 5 Experimental Results 6 Conclusion Acknowledgements References 30 Detecting and Correcting the Degradations of Sensors on Argo Floats Using Artificial Neural Networks Abstract 1 Introduction 2 Artificial Neural Network 2.1 Feed Forward Neural Network 2.2 Back Propagation Neural Network 2.2.1 Actual Algorithm 2.3 Training Neural Network 2.3.1 Supervised Learning 3 Data 4 Flow Chart of Algorithm 5 Results and Discussion 6 Conclusion Acknowledgement References 31 Bit Resultant Matrix for Mining Quantitative Association Rules of Bipolar Item Sets Abstract 1 Introduction 2 Related Work 3 Proposed Work 4 Result and Analysis 5 Conclusion Bibliography 32 Application of Ant Colony Optimization Techniques to Predict Software Cost Estimation Abstract 1 Introduction 2 Literature Review 3 Data Description and Data Preparation 4 Methodology 4.1 Ant Colony Optimization 5 Results and Discussions 6 Conclusion References 33 Cloud-Based e-Healthcare Service System Design for On-Demand Affordable Remote Patient Care Abstract 1 Introduction 2 Background and Motivation 3 Proposed System Design 3.1 Interactive Cloud Storage 3.2 Healthcare Device 4 Software Components of the System 4.1 Data Security 5 Experimental Setup 6 Result and Analysis 7 Conclusion References 34 A Streamlined Approach of Cloud Certificate Less Authentication Scheme Using ASCII Code Data Encryption Technique Abstract 1 Introduction 1.1 Cloud Data Encryption Issues 1.2 Importance of the Subject, Who Holds Encryption Keys 1.3 Using Well Vetted Algorithms with Very Strong Proofs of Security 2 Related Work 2.1 Deployment of Infrastructure 2.2 Secret Key Management 3 Existing System 4 Proposed System 4.1 Secret Key Auditing Protocol 4.2 Encryption Process 4.3 Decryption Process 5 Experimental Results 6 Conclusion References 35 Improved Identity Based Digital Signature Authentication Using Feistel Algorithm in Cloud Computing Abstract 1 Introduction 2 Related Work 2.1 Data Managing/Handling 2.2 Entities 3 Existing System 4 Proposed System 5 Results 6 Conclusion References 36 Securing BIG DATA: A Comparative Study Across RSA, AES, DES, EC and ECDH Abstract 1 Introduction 2 HADOOP Based Cloud Data Center 3 Related Work 4 Comparative Study of Cryptographic Algorithms Over HADOOP Based Cloud Data Center 4.1 Scenario 1 4.2 Scenario 2 4.3 Scenario 3 5 Conclusion References 37 Signal Condition and Acquisition System for a Low Cost EMG Based Prosthetic Hand Abstract 1 Introduction 1.1 Muscle of the Forearm 1.2 Characteristic of EMG Signal 2 Systems Analysis and Selection of Hardware 3 EMG Signal Conditioning System 3.1 Trapping of EMG Signals 3.2 Signal Conditioning 3.3 Interfaces with the Microcontroller 4 Results 5 Observations 6 Conclusion References 38 Wireless Monitoring of NH3 (Ammonia) Using WO3 Thin Film Sensor Abstract 1 Introduction 2 Conductometric Gas Sensors 3 Block Diagram of the Signal Conditioning System 4 Synthesis of Tungsten Oxide (WO3) 5 Characterization 5.1 Chemical Characterization: X-Ray Diffraction (XRD) 5.2 Electrical Characterization: I-V Characterization 6 Results 7 Conclusion References 39 Big Data Layers and Analytics: A Survey Abstract 1 Introduction 2 Background 3 Architecture and Layers of the Big Data 3.1 Big Data Sources/Data Generation 3.2 Acquisition Layer 3.2.1 Data Collection 3.2.2 Data Transmission 3.2.3 Data Preprocessing 3.3 Storage Layer 3.4 Data Analytics Layer 3.4.1 Text Analytics 3.4.2 Audio Analytics 3.4.3 Video Analytics 3.4.4 Social Media Analytics 4 Conclusion References 40 A More Efficient and Secure Untraceable Remote User Password Authentication Scheme Using Smart Card with Session Key Agreement Abstract 1 Introduction 2 The Proposed Scheme 2.1 Registration Phase 2.2 Login Phase 2.3 Authentication Phase 2.4 Password Change Phase 3 Security Analysis of Proposed Scheme 3.1 Prevent (Insider) Conspirator Attack 3.2 Prevent Destruction/Loss of Smart Card Attack 3.3 Prevent User Pose and Server Mask Attack 3.4 Prevent Online Password Imagination/Guessing Attack 3.5 Prevent Repeated/Replay Attack 3.6 Prevent Lifted Verifier Attack 3.7 Prevent Denial of Service (DOS) Attack 4 Goal/Achievement of Proposed Scheme 4.1 Provides Forward Secrecy 4.2 User Identity is Unidentified/Untraceable 4.3 Inherent/Inbuilt Verification Mechanism of Smart Card 4.4 Provides Proper Mutual Authentication 4.5 Provision for Common Session Key Generation 4.6 Provides Better Password Update Facility 5 Performance Analysis and Security Requirement Characteristics 6 Conclusion References 41 Avoiding Slow Running Nodes in Distributed Systems Abstract 1 Introduction 2 Related Work 3 Proposed Solution 4 Experimental Setup 4.1 Cluster Setup 4.2 Workloads 4.3 Datasets 5 Result and Conclusion Acknowledgements References 42 Region Based Semantic Image Retrieval Using Ontology Abstract 1 Introduction 2 Related Work 2.1 Our Approach 2.2 Outline of the Paper 3 The Proposed Method 3.1 Initial Semantic Image Retrieval 3.2 Refine Retrieval Results by Using Ontology 4 Experimental Results 5 Conclusion References 43 Validation of Lehman Laws of Growth and Familiarity for Open Source Java Databases Abstract 1 Introduction 2 Related Work 3 Data Collection Methodology 4 Validation of Law of Evolution for Growth Attributes of Databases 5 Conclusion References 44 Genetic Algorithm and Particle Swarm Optimization: Analysis and Remedial Suggestions Abstract 1 Introduction 2 Analysis: GA and PSO 3 Discussion 4 Conclusions References 45 A Dual Phase Probabilistic Model for Dermatology Classification Abstract 1 Introduction 2 Related Work 3 Proposed Probabilistic Model 4 Results 5 Conclusion References 46 Performance Evaluation of Reproduction Operators in Genetic Algorithm Abstract 1 Introduction 2 Genetic Algorithm and the Reproduction Operators Adapted 3 Computational Experiment, Analysis and Observations 4 Conclusions References 47 Rolling Circle Algorithm for Routing Along the Boundaries of Wireless Sensor Networks Abstract 1 Introduction 2 Related Work 3 System Model and Terminology 4 Rolling Circle Algorithm 5 Simulation Results 6 Conclusion References 48 Improving Shared Cache Performance Using Variation of Bit Set Insertion Policy Abstract 1 Introduction 2 Objectives of the Study 3 Bit Set Insertion Policy (BSIP) with Random Implementation 4 Proposed Algorithm 5 Output Evaluation 6 Conclusion References 49 Phrase Based Web Document Clustering: An Indexing Approach Abstract 1 Introduction 2 Structure of a Webpage 2.1 Representation of a Web Page 3 Document Index Graph 3.1 Structure of the Web Page Based on DIG 3.2 Graph Construction 3.3 Finding Matching Sentences 4 Calculating Similarity 5 Experimental Results 6 Conclusion and Future Research References 50 Effectiveness of FPA in Sparse Data Modelling and Optimization Abstract 1 Introduction 2 Flower Pollination Algorithm 3 Experimental Work 4 Fitness Formulation for Prediction Problem 4.1 Implementation Function 4.2 Formulation of Objective Function for Prediction Model 5 Comparison of Performance 6 Conclusion References 51 Voice Recognition Based on Vector Quantization Using LBG Abstract 1 Introduction 2 Structure of Voice Recognition System 3 Feature Vector Representation 4 Vector Quantization 5 Algorithm Approach 6 Conclusion and Future Scope References 52 Improved In-System Debugging of High Level Synthesis Generated FPGA Circuits Abstract 1 Introduction 2 Background 3 Observability Ports 3.1 Event Observability Ports 3.2 Tracing Event Observability Ports 4 Timing and Event Order Recovery 5 Experimental Results 5.1 Tool Setup 5.2 Results 6 Conclusion References 53 Design of Cascaded Hybrid Interleaver for Fast Turbo Coding and Decoding Abstract 1 Introduction 2 Block Interleaver 3 3GPP Interleaver 3.1 Bits-Input to Rectangular Matrix with Padding 4 Hybrid Interleaver 5 Simulation Results 6 Conclusion References 54 Multi User Authentication in Reliable Data Storage in Cloud Abstract 1 Introduction 2 BGKM Security Procedure with Architecture 3 BGKM with SHAMIR 4 Experimental Evaluation 5 Conclusion References 55 Bio-Inspired Approach for Energy Aware Cluster Head Selection in Wireless Sensor Networks Abstract 1 Introduction 2 Related Work 3 Problem Formulation 4 Energy Consumption Model for WSNs 5 Firefly Algorithm for CH Selection 6 Simulation Environment 6.1 Results Evaluation 7 Conclusion References 56 Performance of Slotted Hexagonal Patch for Wireless Applications Abstract 1 Introduction 2 Geometry of the Proposed Antenna 3 Parametric Analysis of the Antenna 3.1 Tuning Parameters 3.2 Case1: Varying ‘Sl1’ 3.3 Case 2: Varying ‘Sw2’ 4 Conclusion References 57 On the Notch Band Characteristics of Ring Antenna Abstract 1 Introduction 2 Conventional Circular Patch Antenna 3 Proposed Circular Ring Patch Antennas 4 Results and Discussion 5 Conclusion References 58 Design of a Compact Wideband Bow-Tie Dielectric Stacked Patch Antenna for Ku-Band Spectrum Abstract 1 Introduction 2 Stacked Dielectric Patch Antenna Design 3 Parametric Study 4 Simulation Results 4.1 Simulated Return Loss and VSWR Characteristics of the Proposed Antenna 4.2 Simulated Gain Versus Frequency Characteristics of the Proposed Antenna 4.3 Radiation Characteristics of the Proposed Antenna 5 Conclusion Acknowledgements References 59 Design of Scan Cell for System on Chip Scan Based Debugging Applications Abstract 1 Introduction 2 Limitations of Debugging Due to Cross Clock Domain 2.1 Data Invalidation 2.2 Clock-Phase Relationship Inconsistency 3 Proposed Design for Debug Techniques 3.1 Scan Cell Design 3.2 Debug Control 4 Experimental Results 5 Conclusions References 60 Performance of Optimized Reversible Vedic Multipliers Abstract 1 Introduction 2 Review on Vedic Mathematics and Reversible Logic 3 Urdhva Tiryakbhayam Multiplication Algorithms 3.1 Optimization of the UT Multiplier 3.2 Improved 2 × 2 UT Multiplier 4 Simulation Results and Discussions 5 Conclusion References 61 A Novel Congestion Control Scheme in VANET Abstract 1 Introduction 2 Need for Congestion Control Scheme in VANET 3 Related Work 4 Implementation 5 Results 6 Conclusion References 62 An Enhanced Spray-Copy-Wait DTN Routing Using Optimized Delivery Predictability Abstract 1 Introduction 2 Related Work 2.1 Spray-and-Wait Routing Protocol 2.2 PRoPHET Routing Protocol 3 Proposed Work 3.1 Optimally Forwarding Increased Replica 3.2 Message Removal Operation 4 Performance Evaluation 4.1 Simulation Scenario 5 Results and Discussion 5.1 Message Arrival Rate w.r.t. Message Generation Interval 5.2 Overhead w.r.t. Message Generation Interval 5.3 Comparison Analysis 6 Conclusion References 63 Impact of Facebook’s Check-in Feature on Users of Social Networking Sites Abstract 1 Introduction 2 Related Work 3 Methodology 4 Result and Analysis 5 Conclusion 6 Future Scope and Limitation References Author Index