Computer communication, networking and internet security : proceedings of IC3T 2016

The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. I...

Full description

Saved in:
Bibliographic Details
Corporate Author International Conference on Computer and Communication Technologies Vijayawada, India
Other Authors Satapathy, Suresh Chandra, 1964- (Editor), Bhateja, Vikrant (Editor), Raju, K. Srujan (Editor), Janakiramaiah, B. (Editor)
Format Electronic eBook
LanguageEnglish
Published Singapore : Springer, 2017.
SeriesLecture notes in networks and systems ; v. 5.
Subjects
Online AccessPlný text

Cover

Loading…
Table of Contents:
  • Preface; Organising Committee; Patrons; Organising Committee; Local Organising Committee; Contents; Editors and Contributors; 1 Approach Towards Increasing Efficiency of Communication Protocol in Wireless Sensor Network Using Modified Routing Protocol; Abstract; 1 Introduction; 2 Related Work; 3 Neural LEACH and M-Gear; 4 M-Gear; 5 Test Results and Comparison; 6 Conclusion; References; 2 Anomaly Detection System in a Cluster Based MANET; Abstract; 1 Introduction; 2 Related Work; 3 AODV (Adhoc On-Demand Distance Vector); 4 The Proposed Method; 5 Experimental Results; 5.1 Simulation Scenario.
  • 5.2 Summary of Results6 Conclusions; References; 3 Temperature Data Transfer Using Visible Light Communication; Abstract; 1 Introduction; 2 Related Works; 3 Proposed Temperature Data Transfer Using VLC System; 3.1 Temperature Sensing and VLC Transmitting Procedure; 3.2 LOS Channel Model; 3.3 VLC Receiving Procedure; 4 Experimental Testing and Results Discussion; 4.1 Room Temperature Data Transmission Using VLC; 4.1.1 First Test; 4.1.2 Second Test; 4.1.3 Third Test; 4.2 Body Temperature Monitoring and Data Transmission Using VLC; 5 Conclusion and Future Work; References.
  • 4 A New Approach for Data Security in Cryptography and SteganographyAbstract; 1 Introduction; 2 Proposed Method; 2.1 Encoding Message; 2.2 Hiding the Encoded Message into an Image; 3 Results and Discussion; 3.1 At Sender Side; 3.2 At Receiver Side; 3.3 Avalanche Effect; 4 Conclusion; References; 5 Improvement of Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network; Abstract; 1 Introduction; 2 Related Work; 3 Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network; 4 Proposed Protocol; 5 Simulation and Analysis.
  • 6 Conclusion and Future ScopeReferences; 6 Computational and Emotional Linguistic Distance and Language Learning; Abstract; 1 Introduction; 2 Linguistic Distance; 3 Computational Linguistics; 3.1 Approaches to Computational Linguistics; 3.2 Speech Recognition Systems; 4 Computational Linguistic Distance; References; 7 Collaborative Attack Effect Against Table-Driven Routing Protocols for WANETs: A Performance Analysis; Abstract; 1 Introduction; 2 Related Work; 3 Overview of Routing Protocols; 3.1 Proactive Routing Protocols; 3.1.1 Destination-Sequenced Distance-Vector (DSDV) Routing Protocol.
  • 3.1.2 Optimized Link State Routing (OLSR) Routing Protocol3.2 Performance Assessment of Proactive Routing Protocols; 3.2.1 Assessment of DSDV and OLSR Routing Protocol; 4 Modelling Collaborative Attack Against Adhoc Routing Protocols; 5 Simulation Results and Performance Analysis; 6 Conclusion and Future Work; References; 8 Body Biased High Speed Full Adder to LNCS/LNAI/LNBI Proceedings; Abstract; 1 Introduction; 2 Literature Survey; 2.1 CCMOS 28 Transistor Full Adder; 2.2 GDI Full Adder; 2.3 MG-GDI Full Adder; 2.4 Low Power High Speed Hybrid Full Adder; 2.5 High Speed GLBB Technique.