International conference on innovative computing and communications : proceedings of ICICC 2018.: proceedings of ICICC 2018. Volume 1 ([2019])
- Record Type:
- Book
- Title:
- International conference on innovative computing and communications : proceedings of ICICC 2018.: proceedings of ICICC 2018. Volume 1 ([2019])
- Main Title:
- International conference on innovative computing and communications : proceedings of ICICC 2018.
- Further Information:
- Note: Edited by Siddhartha Bhattacharyya, Aboul Ella Hassanien, Deepak Gupta, Ashish Khanna, Indrajit Pan.
- Editors:
- Bhattacharyya, Siddhartha, 1975-
Hassanien, Aboul Ella
Gupta, Deepak, active 2015-2016
Khanna, Ashish
Pan, Indrajit, 1983- - Other Names:
- International Conference on Innovative Computing and Communication
- Contents:
- Intro; ICICC-2018 Steering Committee Members; ICICC-2018 Advisory Committee; Preface; About the Book (Volume 1); Contents; About the Editors; Designing an Intelligent Jammer for Targeted 802.11b/g/n based Network Devices; 1 Introduction; 2 Related Work; 3 Jamming Techniques; 4 Methodology; 4.1 Algorithm; 5 Results and Analysis; 6 Conclusion; References; Hardware Implementation of Public Key Cryptography for Small-Scale Devices; 1 Introduction; 2 Literature Review; 2.1 Encryption; 2.2 Hashing; 3 Proposed Work; 3.1 Implementation Details; 4 Conclusion; References. Proof-of-Participation: Implementation of Proof-of-Stake Through Proof-of-Work1 Introduction; 2 Background; 2.1 Proof-Work (PoW); 2.2 Limitations of PoW; 2.3 Proof-of-Stake (PoS); 2.4 Limitations of PoS; 3 Proof-of-Participation Protocol; 4 Reward Distribution; 5 Discussion; 6 Conclusion; References; Unfolding the Mystery of Ransomware; 1 Introduction; 2 Background; 3 Process of Ransomware; 4 Prevention Techniques; 5 Conclusion and Future Work; References; IOT-Based Smart Museum Using Wearable Device; 1 Introduction; 1.1 Existing Methodologies; 1.2 Objective; 2 Literature Survey. 3 Proposed Method3.1 Image Acquisition; 3.2 Converting the Videos into Frames by Frames; 3.3 Image Matching Technique Using SIFT and SURF; 4 Result and Discussion; 4.1 Setup; 4.2 Experiment; 4.3 Performance Evaluation Based on Execution Time; 5 Conclusion; References; A Survey on Cross-Layer Design Approach for Secure Wireless SensorIntro; ICICC-2018 Steering Committee Members; ICICC-2018 Advisory Committee; Preface; About the Book (Volume 1); Contents; About the Editors; Designing an Intelligent Jammer for Targeted 802.11b/g/n based Network Devices; 1 Introduction; 2 Related Work; 3 Jamming Techniques; 4 Methodology; 4.1 Algorithm; 5 Results and Analysis; 6 Conclusion; References; Hardware Implementation of Public Key Cryptography for Small-Scale Devices; 1 Introduction; 2 Literature Review; 2.1 Encryption; 2.2 Hashing; 3 Proposed Work; 3.1 Implementation Details; 4 Conclusion; References. Proof-of-Participation: Implementation of Proof-of-Stake Through Proof-of-Work1 Introduction; 2 Background; 2.1 Proof-Work (PoW); 2.2 Limitations of PoW; 2.3 Proof-of-Stake (PoS); 2.4 Limitations of PoS; 3 Proof-of-Participation Protocol; 4 Reward Distribution; 5 Discussion; 6 Conclusion; References; Unfolding the Mystery of Ransomware; 1 Introduction; 2 Background; 3 Process of Ransomware; 4 Prevention Techniques; 5 Conclusion and Future Work; References; IOT-Based Smart Museum Using Wearable Device; 1 Introduction; 1.1 Existing Methodologies; 1.2 Objective; 2 Literature Survey. 3 Proposed Method3.1 Image Acquisition; 3.2 Converting the Videos into Frames by Frames; 3.3 Image Matching Technique Using SIFT and SURF; 4 Result and Discussion; 4.1 Setup; 4.2 Experiment; 4.3 Performance Evaluation Based on Execution Time; 5 Conclusion; References; A Survey on Cross-Layer Design Approach for Secure Wireless Sensor Networks; 1 Introduction; 2 Demand for Cross-Layer Design Approach; 3 A Scenario of Cross-Layer Design; 4 Comparative Study of Cross-Layer Protocols in WSN; 5 Challenges and Issues in Cross-Layer Design; 6 Performance Variations; 7 Conclusion; References. Consumer Behavior Toward Mobile Phone Handsets1 Introduction; 2 Literature Review; 3 Objectives; 4 Research Gap; 5 Hypothesis; 6 Research Methodology; 7 Analysis and Interpretation; 8 Findings; 9 Conclusions; 10 Limitations; References; Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography; 1 Introduction; 2 Literature Review; 3 Proposed Work; 4 Proposed Algorithm; 5 Implementation Figures; 6 Conclusion and Future Work; References; A Decentralized Self-detection Mechanism to Defend Selfish Behavior in Spray and Wait Protocol; 1 Introduction. 2 Related Work3 Background; 4 Proposed Methodology; 4.1 Add Selfish Behavior; 4.2 Detection and Mitigation of Selfish Behavior; 5 Simulation and Results; 5.1 Effect on Overhead Ratio; 5.2 Effect on Delivery Ratio; 5.3 Effect on Latency; 6 Conclusion; References; Multithreaded Query Processing Using Quadtree; 1 Introduction; 2 Literature Review; 3 Proposed Methodology; 4 Result and Analysis; 5 Time-Space Complexity; 6 Conclusion and Future Scope; References; Automated Trashcan; 1 Introduction; 2 Literature Survey; 3 Proposed Approach; 3.1 For Automatic Overflow Detection System. … (more)
- Issue Display:
- Volume 1
- Volume:
- 1
- Issue Sort Value:
- 0000-0001-0000-0000
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2019
- Extent:
- 1 online resource (394 pages)
- Subjects:
- 004
Computer science -- Technological innovations -- Congresses
Information technology -- Technological innovations -- Congresses
COMPUTERS -- Computer Literacy
COMPUTERS -- Computer Science
COMPUTERS -- Data Processing
COMPUTERS -- Hardware -- General
COMPUTERS -- Information Technology
COMPUTERS -- Machine Theory
COMPUTERS -- Reference
Information technology -- Technological innovations
Computational Intelligence
Communications Engineering, Networks
Data Mining and Knowledge Discovery
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9789811323249
9811323240 - Related ISBNs:
- 9789811323232
- Notes:
- Note: Print version record.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.408179
- Ingest File:
- 04_024.xml