ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016

دانلود کتاب ارتباطات کامپیوتری، شبکه و امنیت اینترنت: مجموعه مقالات IC3T 2016

Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016

مشخصات کتاب

Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016

ویرایش: [1st ed. 2017] 
نویسندگان: , , ,   
سری: Lecture Notes in Networks and Systems, 5; 5 
ISBN (شابک) : 9811032254, 9789811032257 
ناشر: Springer 
سال نشر: 2017 
تعداد صفحات: 654
[620] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 18 Mb 

قیمت کتاب (تومان) : 30,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب ارتباطات کامپیوتری، شبکه و امنیت اینترنت: مجموعه مقالات IC3T 2016 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Preface
Organising Committee
	Patrons
	Organising Committee
	Local Organising Committee
Contents
Editors and Contributors
1 Approach Towards Increasing Efficiency of Communication Protocol in Wireless Sensor Network Using Modified Routing Protocol
	Abstract
	1 Introduction
	2 Related Work
	3 Neural LEACH and M-Gear
	4 M-Gear
	5 Test Results and Comparison
	6 Conclusion
	References
2 Anomaly Detection System in a Cluster Based MANET
	Abstract
	1 Introduction
	2 Related Work
	3 AODV (Adhoc On-Demand Distance Vector)
	4 The Proposed Method
	5 Experimental Results
		5.1 Simulation Scenario
		5.2 Summary of Results
	6 Conclusions
	References
3 Temperature Data Transfer Using Visible Light Communication
	Abstract
	1 Introduction
	2 Related Works
	3 Proposed Temperature Data Transfer Using VLC System
		3.1 Temperature Sensing and VLC Transmitting Procedure
		3.2 LOS Channel Model
		3.3 VLC Receiving Procedure
	4 Experimental Testing and Results Discussion
		4.1 Room Temperature Data Transmission Using VLC
			4.1.1 First Test
			4.1.2 Second Test
			4.1.3 Third Test
		4.2 Body Temperature Monitoring and Data Transmission Using VLC
	5 Conclusion and Future Work
	References
4 A New Approach for Data Security in Cryptography and Steganography
	Abstract
	1 Introduction
	2 Proposed Method
		2.1 Encoding Message
		2.2 Hiding the Encoded Message into an Image
	3 Results and Discussion
		3.1 At Sender Side
		3.2 At Receiver Side
		3.3 Avalanche Effect
	4 Conclusion
	References
5 Improvement of Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network
	Abstract
	1 Introduction
	2 Related Work
	3 Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network
	4 Proposed Protocol
	5 Simulation and Analysis
	6 Conclusion and Future Scope
	References
6 Computational and Emotional Linguistic Distance and Language Learning
	Abstract
	1 Introduction
	2 Linguistic Distance
	3 Computational Linguistics
		3.1 Approaches to Computational Linguistics
		3.2 Speech Recognition Systems
	4 Computational Linguistic Distance
	References
7 Collaborative Attack Effect Against Table-Driven Routing Protocols for WANETs: A Performance Analysis
	Abstract
	1 Introduction
	2 Related Work
	3 Overview of Routing Protocols
		3.1 Proactive Routing Protocols
			3.1.1 Destination-Sequenced Distance-Vector (DSDV) Routing Protocol
			3.1.2 Optimized Link State Routing (OLSR) Routing Protocol
		3.2 Performance Assessment of Proactive Routing Protocols
			3.2.1 Assessment of DSDV and OLSR Routing Protocol
	4 Modelling Collaborative Attack Against Adhoc Routing Protocols
	5 Simulation Results and Performance Analysis
	6 Conclusion and Future Work
	References
8 Body Biased High Speed Full Adder to LNCS/LNAI/LNBI Proceedings
	Abstract
	1 Introduction
	2 Literature Survey
		2.1 CCMOS 28 Transistor Full Adder
		2.2 GDI Full Adder
		2.3 MG-GDI Full Adder
		2.4 Low Power High Speed Hybrid Full Adder
		2.5 High Speed GLBB Technique
	3 Proposed System
		3.1 Modified XNOR Module
		3.2 Carry Generation Module
		3.3 Design of the Proposed Full Adder
		3.4 Elimination of Glitches
		3.5 Body Biased LPHS Full Adder with 8 Bit Input
	4 Results and Discussions
		4.1 Results Analysis
		4.2 Simulation Results
	5 Conclusion
	Acknowledgements
	References
9 Optimization of Contiguous Link Scheduling
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed Optimized Contiguous Link Scheduling Algorithm
		3.1 Algorithm
	4 Results and Analysis
	5 Conclusion
	Acknowledgements
	References
10 A Novel Reversible EX-NOR SV Gate and Its Application
	Abstract
	1 Introduction
	2 Preview of Reversible Logic Gates
	3 Proposed Design
		3.1 2 × 2 Reversible EXNOR (SV) Gate
		3.2 2 × 2 Reversible EXNOR (SV) Gate Based Equivalence Checker
	4 Results and Discussions
	5 Conclusion
	References
11 Internet of Things and Wireless Physical Layer Security: A Survey
	Abstract
	1 Introduction
	2 Motivation
	3 IoT Concepts
		3.1 IoT Elements
		3.2 IoT Architecture
		3.3 IoT Communication Standards
	4 Wireless Network Security
		4.1 OSI Model for Wireless Systems: Attacks and Security Approach
		4.2 Wireless Physical Layer Security
		4.3 IoT and WPLS Methods
	5 Conclusion
	Acknowledgements
	References
12 Privacy Preservation in Cloud Computing with Double Encryption Method
	Abstract
	1 Introduction
	2 Related Work
	3 Problem Formulation
	4 Proposed Methodologies
		4.1 Algorithm to Store Data
		4.2 Algorithm to Access Data
	5 Results and Discussion
		5.1 Security Measures for Data Storing
		5.2 Security Measures for Data Access
	6 Conclusion and Future Scope
	References
13 A Machine Learning Based Approach for Opinion Mining on Social Network Data
	Abstract
	1 Introduction
	2 Background and Related Work
	3 Methodology
		3.1 Data Collection
		3.2 Preprocessing and Stemming
		3.3 Feature Vector
		3.4 Machine Learning Techniques
	4 Results and Discussion
	5 Conclusion
	References
14 Congestion Control Mechanism for Real Time Traffic in Mobile Adhoc Networks
	Abstract
	1 Introduction
	2 Related Work
	3 Analysis of Congestion Control Issues in Real Time Scenario
	4 The Proposed Approach
	5 Simulation and Results
	6 Conclusion and Future Work
	References
15 Correction of Ocular Artifacts from EEG by DWT with an Improved Thresholding
	Abstract
	1 Introduction
	2 Methodology
		2.1 Data Acquisition
		2.2 Existing and Proposed Thresholding Method
		2.3 Performance Evaluation
	3 Results and Discussions
	4 Conclusions
	References
16 EGRP: Enhanced Geographical Routing Protocol for Vehicular Adhoc Networks
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 Determining Distance
		3.2 Determining the Moving Direction
		3.3 Predicting the Current Position of the Vehicles
	4 Performance Evaluation
		4.1 Simulation Setup
		4.2 Performance Metrics
		4.3 Experimental Results
	5 Conclusion
	Acknowledgements
	References
17 PAPR Performance Analysis of Unitary Transforms in SLM-OFDM for WLAN 802.11a Mobile Terminals
	Abstract
	1 Introduction
	2 Precoded SLM-OFDM
	3 Phase Sequence Set
	4 Unitary Precoding Transform
		4.1 Discrete Cosine Transforms
		4.2 COSHAD Transform
	5 Simulation Results
	6 Conclusion
	References
18 Optimal Sensing Time Allocation for Energy Efficient Data Transmission in Amplify-Forward Cognitive Relay Assisted Network
	Abstract
	1 Introduction
	2 Description of System Exemplary
	3 Optimal Sensing Time (OST) Analysis
	4 Result Analysis
	5 Conclusion
	References
19 Data Privacy in Online Shopping
	Abstract
	1 Introduction
		1.1 Literature Survey
	2 Problem Statement
	3 Proposed Methodology
		3.1 K Anonymity
		3.2 L Diversity
	4 Results
		4.1 Membership Disclosure Protection
		4.2 Homogeneity Attack
	5 Conclusion
	References
20 Design and Performance of Resonant Spacing Linear Patch Array with Quarter Wave Transformer Feed Network for Wireless Applications
	Abstract
	1 Introduction
	2 Design of Feed Network for an Array
	3 Design Consideration
	4 Results and Discussion
		4.1 Results of 1 × 4 RMPA Array
	5 Conclusion
	References
21 Performance Analysis of PUEA and SSDF Attacks in Cognitive Radio Networks
	Abstract
	1 Introduction
	2 System Model
	3 Results and Discussions
	4 Conclusion
	References
22 Design of a 3.4 GHz Wide-Tuning-Range VCO in 0.18 µm CMOS
	Abstract
	1 Introduction
	2 VCO Types
		2.1 Current-Starved Inverter
		2.2 Differential Pair with PFET Loads
	3 Proposed Differential Ring VCO
	4 Simulation Results
	5 Conclusion
	References
23 A New Iterative Hybrid Edge Technique Using Image Mosaic
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed System
		3.1 Diffe Hellman Key Exchange Protocol
		3.2 Reverse Binary XOR Algorithm
		3.3 Least Significant Bit Technique
		3.4 Edge Based Image Mosaic Technique
	4 Experimental Results
	5 Conclusion
	References
24 Time Series Analysis of Oceanographic Data Using Clustering Algorithms
	Abstract
	1 Introduction
		1.1 Related Work
	2 Proposed Work with Block Diagram
		2.1 Clustering Algorithms
			2.1.1 K-Means Algorithm
			2.1.2 Complexity
			2.1.3 DBSCAN Algorithm
	3 Data
	4 Experimantal Results
	5 Conclusions
		5.1 Future Work
	Acknowledgements
	References
25 Cluster Based Prediction of Keyword Query Over Databases
	Abstract
	1 Introduction
	2 Existing System
		2.1 Problem Identification
	3 Proposed System
		3.1 Preprocessing Document Text
		3.2 Construction of MVS Matrix
		3.3 Grouping Related Documents Using K Means Clustering Algorithm
		3.4 Character Shuffle Preprocessing Searching Process
	4 Implementatıon Results
	5 Conclusion
	References
26 An Efficient Data Encryption Through Image via Prime Order Symmetric Key and Bit Shuffle Technique
	Abstract
	1 Introduction
	2 One-Time Padding, AES, RSA
	3 Proposed System
		3.1 Prime Order Symmetric Key Algorithm
		3.2 Data Hide into Image
		3.3 Bit Shuffle Encryption Technique
		3.4 Compression and Decompression Image
	4 Experimental Result
	5 Conclusion
	References
27 Peak Detection and Correlation Analysis in Noisy Time Series Data
	Abstract
	1 Introduction
		1.1 Flow Chart of Proposed Work
	2 Smoothening and Data Validation
	3 Algorithm
		3.1 Simple Peak-Finding Algorithm
	4 Correlation Analysis
	5 Experimental Results
		5.1 Detection of Peaks
		5.2 Results of Correlation Analysis
			5.2.1 Long-Term Variation
	6 Conclusion
	Acknowledgements
	References
28 Novel Hash Based Key Generation for Stream Cipher in Cloud
	Abstract
	1 Introduction
	2 Cloud Computing Security Concerns
		2.1 Security Issues in Cloud
		2.2 Information Security Requirements
	3 Related Work
	4 Proposed Method
		4.1 Key Generation
		4.2 Encryption
		4.3 Decryption
	5 Experimental Results
	6 Conclusion
	References
29 PSNM: An Algorithm for Detecting Duplicates in Oceanographic Data
	Abstract
	1 Introduction
	2 PSNM Algorithm
	3 Data Validation
	4 Flow Chart of Duplicate Detection
	5 Experimental Results
	6 Conclusion
	Acknowledgements
	References
30 Detecting and Correcting the Degradations of Sensors on Argo Floats Using Artificial Neural Networks
	Abstract
	1 Introduction
	2 Artificial Neural Network
		2.1 Feed Forward Neural Network
		2.2 Back Propagation Neural Network
			2.2.1 Actual Algorithm
		2.3 Training Neural Network
			2.3.1 Supervised Learning
	3 Data
	4 Flow Chart of Algorithm
	5 Results and Discussion
	6 Conclusion
	Acknowledgement
	References
31 Bit Resultant Matrix for Mining Quantitative Association Rules of Bipolar Item Sets
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed Work
	4 Result and Analysis
	5 Conclusion
	Bibliography
32 Application of Ant Colony Optimization Techniques to Predict Software Cost Estimation
	Abstract
	1 Introduction
	2 Literature Review
	3 Data Description and Data Preparation
	4 Methodology
		4.1 Ant Colony Optimization
	5 Results and Discussions
	6 Conclusion
	References
33 Cloud-Based e-Healthcare Service System Design for On-Demand Affordable Remote Patient Care
	Abstract
	1 Introduction
	2 Background and Motivation
	3 Proposed System Design
		3.1 Interactive Cloud Storage
		3.2 Healthcare Device
	4 Software Components of the System
		4.1 Data Security
	5 Experimental Setup
	6 Result and Analysis
	7 Conclusion
	References
34 A Streamlined Approach of Cloud Certificate Less Authentication Scheme Using ASCII Code Data Encryption Technique
	Abstract
	1 Introduction
		1.1 Cloud Data Encryption Issues
		1.2 Importance of the Subject, Who Holds Encryption Keys
		1.3 Using Well Vetted Algorithms with Very Strong Proofs of Security
	2 Related Work
		2.1 Deployment of Infrastructure
		2.2 Secret Key Management
	3 Existing System
	4 Proposed System
		4.1 Secret Key Auditing Protocol
		4.2 Encryption Process
		4.3 Decryption Process
	5 Experimental Results
	6 Conclusion
	References
35 Improved Identity Based Digital Signature Authentication Using Feistel Algorithm in Cloud Computing
	Abstract
	1 Introduction
	2 Related Work
		2.1 Data Managing/Handling
		2.2 Entities
	3 Existing System
	4 Proposed System
	5 Results
	6 Conclusion
	References
36 Securing BIG DATA: A Comparative Study Across RSA, AES, DES, EC and ECDH
	Abstract
	1 Introduction
	2 HADOOP Based Cloud Data Center
	3 Related Work
	4 Comparative Study of Cryptographic Algorithms Over HADOOP Based Cloud Data Center
		4.1 Scenario 1
		4.2 Scenario 2
		4.3 Scenario 3
	5 Conclusion
	References
37 Signal Condition and Acquisition System for a Low Cost EMG Based Prosthetic Hand
	Abstract
	1 Introduction
		1.1 Muscle of the Forearm
		1.2 Characteristic of EMG Signal
	2 Systems Analysis and Selection of Hardware
	3 EMG Signal Conditioning System
		3.1 Trapping of EMG Signals
		3.2 Signal Conditioning
		3.3 Interfaces with the Microcontroller
	4 Results
	5 Observations
	6 Conclusion
	References
38 Wireless Monitoring of NH3 (Ammonia) Using WO3 Thin Film Sensor
	Abstract
	1 Introduction
	2 Conductometric Gas Sensors
	3 Block Diagram of the Signal Conditioning System
	4 Synthesis of Tungsten Oxide (WO3)
	5 Characterization
		5.1 Chemical Characterization: X-Ray Diffraction (XRD)
		5.2 Electrical Characterization: I-V Characterization
	6 Results
	7 Conclusion
	References
39 Big Data Layers and Analytics: A Survey
	Abstract
	1 Introduction
	2 Background
	3 Architecture and Layers of the Big Data
		3.1 Big Data Sources/Data Generation
		3.2 Acquisition Layer
			3.2.1 Data Collection
			3.2.2 Data Transmission
			3.2.3 Data Preprocessing
		3.3 Storage Layer
		3.4 Data Analytics Layer
			3.4.1 Text Analytics
			3.4.2 Audio Analytics
			3.4.3 Video Analytics
			3.4.4 Social Media Analytics
	4 Conclusion
	References
40 A More Efficient and Secure Untraceable Remote User Password Authentication Scheme Using Smart Card with Session Key Agreement
	Abstract
	1 Introduction
	2 The Proposed Scheme
		2.1 Registration Phase
		2.2 Login Phase
		2.3 Authentication Phase
		2.4 Password Change Phase
	3 Security Analysis of Proposed Scheme
		3.1 Prevent (Insider) Conspirator Attack
		3.2 Prevent Destruction/Loss of Smart Card Attack
		3.3 Prevent User Pose and Server Mask Attack
		3.4 Prevent Online Password Imagination/Guessing Attack
		3.5 Prevent Repeated/Replay Attack
		3.6 Prevent Lifted Verifier Attack
		3.7 Prevent Denial of Service (DOS) Attack
	4 Goal/Achievement of Proposed Scheme
		4.1 Provides Forward Secrecy
		4.2 User Identity is Unidentified/Untraceable
		4.3 Inherent/Inbuilt Verification Mechanism of Smart Card
		4.4 Provides Proper Mutual Authentication
		4.5 Provision for Common Session Key Generation
		4.6 Provides Better Password Update Facility
	5 Performance Analysis and Security Requirement Characteristics
	6 Conclusion
	References
41 Avoiding Slow Running Nodes in Distributed Systems
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed Solution
	4 Experimental Setup
		4.1 Cluster Setup
		4.2 Workloads
		4.3 Datasets
	5 Result and Conclusion
	Acknowledgements
	References
42 Region Based Semantic Image Retrieval Using Ontology
	Abstract
	1 Introduction
	2 Related Work
		2.1 Our Approach
		2.2 Outline of the Paper
	3 The Proposed Method
		3.1 Initial Semantic Image Retrieval
		3.2 Refine Retrieval Results by Using Ontology
	4 Experimental Results
	5 Conclusion
	References
43 Validation of Lehman Laws of Growth and Familiarity for Open Source Java Databases
	Abstract
	1 Introduction
	2 Related Work
	3 Data Collection Methodology
	4 Validation of Law of Evolution for Growth Attributes of Databases
	5 Conclusion
	References
44 Genetic Algorithm and Particle Swarm Optimization: Analysis and Remedial Suggestions
	Abstract
	1 Introduction
	2 Analysis: GA and PSO
	3 Discussion
	4 Conclusions
	References
45 A Dual Phase Probabilistic Model for Dermatology Classification
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed Probabilistic Model
	4 Results
	5 Conclusion
	References
46 Performance Evaluation of Reproduction Operators in Genetic Algorithm
	Abstract
	1 Introduction
	2 Genetic Algorithm and the Reproduction Operators Adapted
	3 Computational Experiment, Analysis and Observations
	4 Conclusions
	References
47 Rolling Circle Algorithm for Routing Along the Boundaries of Wireless Sensor Networks
	Abstract
	1 Introduction
	2 Related Work
	3 System Model and Terminology
	4 Rolling Circle Algorithm
	5 Simulation Results
	6 Conclusion
	References
48 Improving Shared Cache Performance Using Variation of Bit Set Insertion Policy
	Abstract
	1 Introduction
	2 Objectives of the Study
	3 Bit Set Insertion Policy (BSIP) with Random Implementation
	4 Proposed Algorithm
	5 Output Evaluation
	6 Conclusion
	References
49 Phrase Based Web Document Clustering: An Indexing Approach
	Abstract
	1 Introduction
	2 Structure of a Webpage
		2.1 Representation of a Web Page
	3 Document Index Graph
		3.1 Structure of the Web Page Based on DIG
		3.2 Graph Construction
		3.3 Finding Matching Sentences
	4 Calculating Similarity
	5 Experimental Results
	6 Conclusion and Future Research
	References
50 Effectiveness of FPA in Sparse Data Modelling and Optimization
	Abstract
	1 Introduction
	2 Flower Pollination Algorithm
	3 Experimental Work
	4 Fitness Formulation for Prediction Problem
		4.1 Implementation Function
		4.2 Formulation of Objective Function for Prediction Model
	5 Comparison of Performance
	6 Conclusion
	References
51 Voice Recognition Based on Vector Quantization Using LBG
	Abstract
	1 Introduction
	2 Structure of Voice Recognition System
	3 Feature Vector Representation
	4 Vector Quantization
	5 Algorithm Approach
	6 Conclusion and Future Scope
	References
52 Improved In-System Debugging of High Level Synthesis Generated FPGA Circuits
	Abstract
	1 Introduction
	2 Background
	3 Observability Ports
		3.1 Event Observability Ports
		3.2 Tracing Event Observability Ports
	4 Timing and Event Order Recovery
	5 Experimental Results
		5.1 Tool Setup
		5.2 Results
	6 Conclusion
	References
53 Design of Cascaded Hybrid Interleaver for Fast Turbo Coding and Decoding
	Abstract
	1 Introduction
	2 Block Interleaver
	3 3GPP Interleaver
		3.1 Bits-Input to Rectangular Matrix with Padding
	4 Hybrid Interleaver
	5 Simulation Results
	6 Conclusion
	References
54 Multi User Authentication in Reliable Data Storage in Cloud
	Abstract
	1 Introduction
	2 BGKM Security Procedure with Architecture
	3 BGKM with SHAMIR
	4 Experimental Evaluation
	5 Conclusion
	References
55 Bio-Inspired Approach for Energy Aware Cluster Head Selection in Wireless Sensor Networks
	Abstract
	1 Introduction
	2 Related Work
	3 Problem Formulation
	4 Energy Consumption Model for WSNs
	5 Firefly Algorithm for CH Selection
	6 Simulation Environment
		6.1 Results Evaluation
	7 Conclusion
	References
56 Performance of Slotted Hexagonal Patch for Wireless Applications
	Abstract
	1 Introduction
	2 Geometry of the Proposed Antenna
	3 Parametric Analysis of the Antenna
		3.1 Tuning Parameters
		3.2 Case1: Varying ‘Sl1’
		3.3 Case 2: Varying ‘Sw2’
	4 Conclusion
	References
57 On the Notch Band Characteristics of Ring Antenna
	Abstract
	1 Introduction
	2 Conventional Circular Patch Antenna
	3 Proposed Circular Ring Patch Antennas
	4 Results and Discussion
	5 Conclusion
	References
58 Design of a Compact Wideband Bow-Tie Dielectric Stacked Patch Antenna for Ku-Band Spectrum
	Abstract
	1 Introduction
	2 Stacked Dielectric Patch Antenna Design
	3 Parametric Study
	4 Simulation Results
		4.1 Simulated Return Loss and VSWR Characteristics of the Proposed Antenna
		4.2 Simulated Gain Versus Frequency Characteristics of the Proposed Antenna
		4.3 Radiation Characteristics of the Proposed Antenna
	5 Conclusion
	Acknowledgements
	References
59 Design of Scan Cell for System on Chip Scan Based Debugging Applications
	Abstract
	1 Introduction
	2 Limitations of Debugging Due to Cross Clock Domain
		2.1 Data Invalidation
		2.2 Clock-Phase Relationship Inconsistency
	3 Proposed Design for Debug Techniques
		3.1 Scan Cell Design
		3.2 Debug Control
	4 Experimental Results
	5 Conclusions
	References
60 Performance of Optimized Reversible Vedic Multipliers
	Abstract
	1 Introduction
	2 Review on Vedic Mathematics and Reversible Logic
	3 Urdhva Tiryakbhayam Multiplication Algorithms
		3.1 Optimization of the UT Multiplier
		3.2 Improved 2 × 2 UT Multiplier
	4 Simulation Results and Discussions
	5 Conclusion
	References
61 A Novel Congestion Control Scheme in VANET
	Abstract
	1 Introduction
	2 Need for Congestion Control Scheme in VANET
	3 Related Work
	4 Implementation
	5 Results
	6 Conclusion
	References
62 An Enhanced Spray-Copy-Wait DTN Routing Using Optimized Delivery Predictability
	Abstract
	1 Introduction
	2 Related Work
		2.1 Spray-and-Wait Routing Protocol
		2.2 PRoPHET Routing Protocol
	3 Proposed Work
		3.1 Optimally Forwarding Increased Replica
		3.2 Message Removal Operation
	4 Performance Evaluation
		4.1 Simulation Scenario
	5 Results and Discussion
		5.1 Message Arrival Rate w.r.t. Message Generation Interval
		5.2 Overhead w.r.t. Message Generation Interval
		5.3 Comparison Analysis
	6 Conclusion
	References
63 Impact of Facebook’s Check-in Feature on Users of Social Networking Sites
	Abstract
	1 Introduction
	2 Related Work
	3 Methodology
	4 Result and Analysis
	5 Conclusion
	6 Future Scope and Limitation
	References
Author Index




نظرات کاربران