Computer communication, networking and internet security : proceedings of IC3T 2016 /: proceedings of IC3T 2016. (2017)
- Record Type:
- Book
- Title:
- Computer communication, networking and internet security : proceedings of IC3T 2016 /: proceedings of IC3T 2016. (2017)
- Main Title:
- Computer communication, networking and internet security : proceedings of IC3T 2016
- Other Titles:
- IC3T 2016
- Further Information:
- Note: Suresh Chandra Satapathy, Vikrant Bhateja, K. Sruhan Raju, B. Janakiramaiah, editors.
- Editors:
- Satapathy, Suresh Chandra, 1964-
Bhateja, Vikrant
Raju, K. Srujan
Janakiramaiah, B - Other Names:
- International Conference on Computer and Communication Technologies, 3rd
- Contents:
- Preface; Organising Committee; Patrons; Organising Committee; Local Organising Committee; Contents; Editors and Contributors; 1 Approach Towards Increasing Efficiency of Communication Protocol in Wireless Sensor Network Using Modified Routing Protocol; Abstract; 1 Introduction; 2 Related Work; 3 Neural LEACH and M-Gear; 4 M-Gear; 5 Test Results and Comparison; 6 Conclusion; References; 2 Anomaly Detection System in a Cluster Based MANET; Abstract; 1 Introduction; 2 Related Work; 3 AODV (Adhoc On-Demand Distance Vector); 4 The Proposed Method; 5 Experimental Results; 5.1 Simulation Scenario. 5.2 Summary of Results6 Conclusions; References; 3 Temperature Data Transfer Using Visible Light Communication; Abstract; 1 Introduction; 2 Related Works; 3 Proposed Temperature Data Transfer Using VLC System; 3.1 Temperature Sensing and VLC Transmitting Procedure; 3.2 LOS Channel Model; 3.3 VLC Receiving Procedure; 4 Experimental Testing and Results Discussion; 4.1 Room Temperature Data Transmission Using VLC; 4.1.1 First Test; 4.1.2 Second Test; 4.1.3 Third Test; 4.2 Body Temperature Monitoring and Data Transmission Using VLC; 5 Conclusion and Future Work; References. 4 A New Approach for Data Security in Cryptography and SteganographyAbstract; 1 Introduction; 2 Proposed Method; 2.1 Encoding Message; 2.2 Hiding the Encoded Message into an Image; 3 Results and Discussion; 3.1 At Sender Side; 3.2 At Receiver Side; 3.3 Avalanche Effect; 4 Conclusion; References; 5 Improvement of TowardPreface; Organising Committee; Patrons; Organising Committee; Local Organising Committee; Contents; Editors and Contributors; 1 Approach Towards Increasing Efficiency of Communication Protocol in Wireless Sensor Network Using Modified Routing Protocol; Abstract; 1 Introduction; 2 Related Work; 3 Neural LEACH and M-Gear; 4 M-Gear; 5 Test Results and Comparison; 6 Conclusion; References; 2 Anomaly Detection System in a Cluster Based MANET; Abstract; 1 Introduction; 2 Related Work; 3 AODV (Adhoc On-Demand Distance Vector); 4 The Proposed Method; 5 Experimental Results; 5.1 Simulation Scenario. 5.2 Summary of Results6 Conclusions; References; 3 Temperature Data Transfer Using Visible Light Communication; Abstract; 1 Introduction; 2 Related Works; 3 Proposed Temperature Data Transfer Using VLC System; 3.1 Temperature Sensing and VLC Transmitting Procedure; 3.2 LOS Channel Model; 3.3 VLC Receiving Procedure; 4 Experimental Testing and Results Discussion; 4.1 Room Temperature Data Transmission Using VLC; 4.1.1 First Test; 4.1.2 Second Test; 4.1.3 Third Test; 4.2 Body Temperature Monitoring and Data Transmission Using VLC; 5 Conclusion and Future Work; References. 4 A New Approach for Data Security in Cryptography and SteganographyAbstract; 1 Introduction; 2 Proposed Method; 2.1 Encoding Message; 2.2 Hiding the Encoded Message into an Image; 3 Results and Discussion; 3.1 At Sender Side; 3.2 At Receiver Side; 3.3 Avalanche Effect; 4 Conclusion; References; 5 Improvement of Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network; Abstract; 1 Introduction; 2 Related Work; 3 Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network; 4 Proposed Protocol; 5 Simulation and Analysis. 6 Conclusion and Future ScopeReferences; 6 Computational and Emotional Linguistic Distance and Language Learning; Abstract; 1 Introduction; 2 Linguistic Distance; 3 Computational Linguistics; 3.1 Approaches to Computational Linguistics; 3.2 Speech Recognition Systems; 4 Computational Linguistic Distance; References; 7 Collaborative Attack Effect Against Table-Driven Routing Protocols for WANETs: A Performance Analysis; Abstract; 1 Introduction; 2 Related Work; 3 Overview of Routing Protocols; 3.1 Proactive Routing Protocols; 3.1.1 Destination-Sequenced Distance-Vector (DSDV) Routing Protocol. 3.1.2 Optimized Link State Routing (OLSR) Routing Protocol3.2 Performance Assessment of Proactive Routing Protocols; 3.2.1 Assessment of DSDV and OLSR Routing Protocol; 4 Modelling Collaborative Attack Against Adhoc Routing Protocols; 5 Simulation Results and Performance Analysis; 6 Conclusion and Future Work; References; 8 Body Biased High Speed Full Adder to LNCS/LNAI/LNBI Proceedings; Abstract; 1 Introduction; 2 Literature Survey; 2.1 CCMOS 28 Transistor Full Adder; 2.2 GDI Full Adder; 2.3 MG-GDI Full Adder; 2.4 Low Power High Speed Hybrid Full Adder; 2.5 High Speed GLBB Technique. … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource (xxxi, 623 pages), illustrations
- Subjects:
- 004.6
Computer networks -- Congresses
Telecommunication systems -- Congresses
COMPUTERS -- Computer Literacy
COMPUTERS -- Computer Science
COMPUTERS -- Data Processing
COMPUTERS -- Hardware -- General
COMPUTERS -- Information Technology
COMPUTERS -- Machine Theory
COMPUTERS -- Reference
Computer networks
Telecommunication systems
Engineering
Communications Engineering, Networks
Systems and Data Security
Computational Intelligence
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9789811032264
9811032262 - Related ISBNs:
- 9789811032257
9811032254 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed May 12, 2017).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.405641
- Ingest File:
- 02_475.xml