Computer communication, networking and internet security : proceedings of IC3T 2016
The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. I...
Saved in:
Corporate Author | |
---|---|
Other Authors | , , , |
Format | Electronic eBook |
Language | English |
Published |
Singapore :
Springer,
2017.
|
Series | Lecture notes in networks and systems ;
v. 5. |
Subjects | |
Online Access | Plný text |
Cover
Loading…
Table of Contents:
- Preface; Organising Committee; Patrons; Organising Committee; Local Organising Committee; Contents; Editors and Contributors; 1 Approach Towards Increasing Efficiency of Communication Protocol in Wireless Sensor Network Using Modified Routing Protocol; Abstract; 1 Introduction; 2 Related Work; 3 Neural LEACH and M-Gear; 4 M-Gear; 5 Test Results and Comparison; 6 Conclusion; References; 2 Anomaly Detection System in a Cluster Based MANET; Abstract; 1 Introduction; 2 Related Work; 3 AODV (Adhoc On-Demand Distance Vector); 4 The Proposed Method; 5 Experimental Results; 5.1 Simulation Scenario.
- 5.2 Summary of Results6 Conclusions; References; 3 Temperature Data Transfer Using Visible Light Communication; Abstract; 1 Introduction; 2 Related Works; 3 Proposed Temperature Data Transfer Using VLC System; 3.1 Temperature Sensing and VLC Transmitting Procedure; 3.2 LOS Channel Model; 3.3 VLC Receiving Procedure; 4 Experimental Testing and Results Discussion; 4.1 Room Temperature Data Transmission Using VLC; 4.1.1 First Test; 4.1.2 Second Test; 4.1.3 Third Test; 4.2 Body Temperature Monitoring and Data Transmission Using VLC; 5 Conclusion and Future Work; References.
- 4 A New Approach for Data Security in Cryptography and SteganographyAbstract; 1 Introduction; 2 Proposed Method; 2.1 Encoding Message; 2.2 Hiding the Encoded Message into an Image; 3 Results and Discussion; 3.1 At Sender Side; 3.2 At Receiver Side; 3.3 Avalanche Effect; 4 Conclusion; References; 5 Improvement of Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network; Abstract; 1 Introduction; 2 Related Work; 3 Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network; 4 Proposed Protocol; 5 Simulation and Analysis.
- 6 Conclusion and Future ScopeReferences; 6 Computational and Emotional Linguistic Distance and Language Learning; Abstract; 1 Introduction; 2 Linguistic Distance; 3 Computational Linguistics; 3.1 Approaches to Computational Linguistics; 3.2 Speech Recognition Systems; 4 Computational Linguistic Distance; References; 7 Collaborative Attack Effect Against Table-Driven Routing Protocols for WANETs: A Performance Analysis; Abstract; 1 Introduction; 2 Related Work; 3 Overview of Routing Protocols; 3.1 Proactive Routing Protocols; 3.1.1 Destination-Sequenced Distance-Vector (DSDV) Routing Protocol.
- 3.1.2 Optimized Link State Routing (OLSR) Routing Protocol3.2 Performance Assessment of Proactive Routing Protocols; 3.2.1 Assessment of DSDV and OLSR Routing Protocol; 4 Modelling Collaborative Attack Against Adhoc Routing Protocols; 5 Simulation Results and Performance Analysis; 6 Conclusion and Future Work; References; 8 Body Biased High Speed Full Adder to LNCS/LNAI/LNBI Proceedings; Abstract; 1 Introduction; 2 Literature Survey; 2.1 CCMOS 28 Transistor Full Adder; 2.2 GDI Full Adder; 2.3 MG-GDI Full Adder; 2.4 Low Power High Speed Hybrid Full Adder; 2.5 High Speed GLBB Technique.