Advances in Computing and Communications, Part III First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part III
Saved in:
Main Authors | , , , , |
---|---|
Format | eBook |
Language | English |
Published |
Berlin, Heidelberg
Springer Berlin / Heidelberg
2011
|
Edition | 1 |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Author | Suzuki, Junichi Lloret Mauri, Jaime Thampi, Sabu M Abraham, Ajith Buford, John |
---|---|
Author_xml | – sequence: 1 fullname: Abraham, Ajith – sequence: 2 fullname: Buford, John – sequence: 3 fullname: Suzuki, Junichi – sequence: 4 fullname: Thampi, Sabu M – sequence: 5 fullname: Lloret Mauri, Jaime |
BookMark | eNotjMtOwzAQAI14iLbkH3LjQqT1rt21jyUqEKkSHOBcOYmNAq1d4pTvB0TnMprLzMVFTNGficKyoaVCREbAczE_hbTmSsxYK5ZMBNeiyPkDftEEbGAmcNV_u9j5XA6xrNP-cJyG-F662P_V_hiHzk1DivmufHHjVDZNcyMug9tlX5y8EG8P69f6qdo8Pzb1alP1VmpbIQTZArbgAjivkJk4UJBGt8aoVoM1MqieGKVV0kpJneslonGs2RtJC3H7_z2M6evo87T1bUqfnY_T6Hbb9X1NsGQgoB_KEEW- |
ContentType | eBook |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9783642227202 3642227201 |
Edition | 1 |
ExternalDocumentID | EBC3067030 |
GroupedDBID | -T. 089 0D6 0DA 38. 9-X A4J AABBV AAFYB AAMFE ABBVZ ABFCV ABMNI ABTMC AECAB AECMQ AEGQK AEHWL AEKFX AETDV AEZAY AFNRJ ALMA_UNASSIGNED_HOLDINGS ANXAN AZZ BBABE C9S C9V CZZ I4C IEZ JJU MA. NUC SAO SBO SNUHX TCUKC TPJZQ Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z82 Z83 Z84 Z85 Z87 Z88 |
ID | FETCH-LOGICAL-d9159-20f1b02b0af0ae427737f3f185b884b50981f4d37219419113cad1228a757e813 |
ISBN | 3642227198 9783642227196 |
IngestDate | Tue Jan 30 00:30:37 EST 2024 |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum_Ident | QA75.5-76.95 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-d9159-20f1b02b0af0ae427737f3f185b884b50981f4d37219419113cad1228a757e813 |
OCLC | 754717330 |
PQID | EBC3067030 |
PageCount | 715 |
ParticipantIDs | proquest_ebookcentral_EBC3067030 |
PublicationCentury | 2000 |
PublicationDate | 2011 |
PublicationDateYYYYMMDD | 2011-01-01 |
PublicationDate_xml | – year: 2011 text: 2011 |
PublicationDecade | 2010 |
PublicationPlace | Berlin, Heidelberg |
PublicationPlace_xml | – name: Berlin, Heidelberg |
PublicationYear | 2011 |
Publisher | Springer Berlin / Heidelberg |
Publisher_xml | – name: Springer Berlin / Heidelberg |
SSID | ssj0000530780 |
Score | 1.8781579 |
SourceID | proquest |
SourceType | Publisher |
SubjectTerms | Congresses Electronic data processing |
Subtitle | First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part III |
TableOfContents | System Architecture -- Random Number Generator Based Multi-modulation Software Defined Radio Transmitter -- Adaptive SDR Receiver -- Platform Used -- System Level Simulations -- Conclusion and Future Scope -- References -- Abstraction of Exudates in Color Fundus Images -- Introduction -- Related Works -- Proposed Method -- Image Acquisition -- Preprocessing -- Retinal Image Segmentation -- Feature Selection -- Region Level Classification -- Results -- Conclusion -- References -- A Histogram Adaptation for Contrast Enhancement -- Introduction -- Histogram Adaptation -- Methodologies -- Adjustable Histogram Equalization -- Histogram Smoothing -- Weighted Histogram Approximation -- Low-Complexity Histogram Modification Algorithm -- Results and Discussion -- Conclusion -- References -- Evaluating the Performance of a Speech Recognition Based System -- Introduction -- Evaluation without Testing -- Case Study -- Conclusion -- References -- Unified Approach in Food Quality Evaluation Using Machine Vision -- Introduction -- Quality Evaluation Using Machine Vision -- Assesment of Food Products -- Proposed Unified Approach for Quality Evaluation -- Conclusion -- References -- Mach-Zehnder Interferometer Based All-Optical Peres Gate -- Introduction -- SOA Based MZI Switch -- Peres Gate (PG) Architecture and Its Simulation -- Peres Gate (PG) Configuration Using MZI -- Functional Operations -- Simulation and Performance Evaluation -- Concluding Remarks -- References -- Using PSO in Image Hiding Scheme Based on LSB Substitution -- Introduction -- Particle Swarm Optimization -- Proposed Technique -- Extraction of Secret Image -- Experimental Results -- Conclusions -- References -- Matrix Embedding Using Random Linear Codes and Its Steganalysis -- Introduction -- Basic Concepts -- Matrix Embedding Matrix Embedding Using Random Linear Codes for Large Relative Payloads Title -- Preface -- Organization -- Table of Contents -- Security, Trust and Privacy -- Chaotic Integrity Check Value -- Introduction -- Proposed Hash Function -- Strengthening the Proposed Hash Function -- Scheme A -- Scheme B -- Results and Analysis -- Checking for Collisions in the Whole Space -- Sensitivity of Proposed Keyed Hash Function with Respect to Input Message -- Sensitivity of Control Parameter -- Sensitivity of Initial Value -- Collision Analysis -- Conclusions -- References -- An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers -- and Their Countermeasures -- Introduction -- Advanced Keylogger Characteristics -- Keylogger Methodology: Stealth and Persistence -- Keylogger Malware Statistics -- Anti-keylogger Analysis -- Mitigation Techniques Users -- Multifactor Authentication to Thwart Password Stealing [10] -- Scratch List -- Time Based -- Challenge Response Based -- Our Solution -- Advantages -- Disadvantage -- Conclusion -- References -- Cancelable Biometrics for Better Security and Privacy in Biometric Systems -- Introduction -- Cancelable Biometrics: Related Work -- A Biometric Data Shuffling Scheme to Create Cancelable Biometric Templates -- The Shuffling Technique -- Advantages of Using the Proposed Shuffling Scheme -- Experimental Setup -- Experimental Results and Security Analysis -- Results and Security Analysis on Iris Modality -- Results and Security Analysis on Face Modality -- Conclusions and Perspectives -- References -- Advanced Clustering Based Intrusion Detection (ACID) Algorithm -- Introduction -- Intrusion -- Intrusion Detection and Its Importance -- Clustering -- Introduction -- Clustering in Intrusion Detection -- Advanced Clustering Based Intrusion Detection (ACID) Algorithm -- Introduction -- Analysis of the Problem -- Solution Strategy -- Various Modules or Functions Used Simulation Results -- Comparison of End to End Delay with AODV, DSR, DSDV -- Comparison of Packet Delivery Ratio with AODV, DSR, DSDV -- Comparison of Packet Loss with AODV, DSR, DSDV -- Comparison of Energy Consumption with AODV, DSR, DSDV -- Conclusion and Future Work -- References -- Signal and Image Processing -- Palmprint Authentication by Phase Congruency Features -- Introduction -- Palmprint Authentication System -- Feature Extraction Using Phase Congruency Features -- Feature Matching -- Euclidean Distance Similarity Measurement -- Reference Threshold -- Experimental Results and Analysis -- Palmprint Authentication System -- Reference Threshold Calculation -- Conclusion -- References -- Design and Implementation of 3D DWT for 4D Image Based Noninvasive Surgery -- Introduction -- 3D Discrete Wavelet Transform for 4D Imaging -- Proposed 3D DWT for 4D Imaging -- Simulink Model Design of 3D-DWT -- Result and Discussion -- Conclusion -- References -- Stratified SIFT Matching for Human Iris Recognition -- Introduction -- Conventional SIFT Matching -- Stratified SIFT Matching -- Strata I: SIFT Matching -- Strata II: Gradient Based Filtering -- Strata III: Scale Based Filtering -- Experimental Results -- Conclusions -- References -- Quality Index Based Face Recognition under Varying Illumination Conditions -- Introduction -- Image Quality Index Based Face Recognition -- Results and Discussion -- Conclusion -- References -- Noise Adaptive Weighted Switching Median Filter for Removing High Density Impulse Noise -- Introduction -- Noise Models -- Noise Adaptive Weighted Switching Median (NAWSM) Filter -- Noise Detection Stage -- Noise Filtering Stage -- Performance Measures -- Results and Discussion -- Conclusion -- References -- SMT-8036 Based Implementation of Secured Software Defined Radio System for Adaptive Modulation Technique -- Introduction Results and Discussion -- Conclusions -- References -- Measuring the Deployment Hiccups of DNSSEC -- Introduction -- Background -- Domain Name System (DNS) -- DNS Security Extensions (DNSSEC) -- Methodology -- PlanetLab -- Tor -- Data Collection -- Results -- Node Categorization -- Failure Patterns -- Related Work -- Conclusion -- References -- Sensor Networks -- Self-organizing MAC Protocol Switching for Performance Adaptation in Wireless Sensor Networks -- Introduction -- Background -- Related Work -- Proposed Dynamic MAC Protocol Switching -- Protocol Adaptations -- Adaptations of CSMA/CA for TDMA Coexistence -- Adaptation of TDMA for CSMA/CA Coexistence -- MAC Protocol Switching Logic -- Influencing Switching Parameters -- Switching Criteria -- Experimental Evaluation -- Switching in Response to Changes in Data Rate -- Switching in Response to Number of Active Nodes -- Switching with Spatially Clustered Traffic -- Conclusions and Ongoing Work -- References -- DFDNM: A Distributed Fault Detection and Node Management Scheme for Wireless Sensor Network -- Introduction -- Cellular Automata -- Mathematical Analysis -- Energy Requirement for Wireless Communication -- Fault Detection -- Proposed DFDNM Approach -- Experimental Results -- Conclusions -- References -- An Optimized Reduced Energy Consumption (OREC) Algorithm for Routing in Wireless Sensor Networks -- Introduction -- Related Work -- Proposed Method -- The Node Deployment Protocol -- The Realistic Power Model -- Optimized Reduced Energy Consumption (OREC) Algorithm -- Simulation Results -- Conclusion and Future Work -- References -- Improving Energy Efficiency of Underwater Acoustic Sensor Networks Using Transmission Power Control: A Cross-Layer Approach -- Introduction -- Related Work -- Transmission Power Control to Enhance Energy Efficiency -- Overview of RMAC RMAC with Power Control (RMAC-PC) -- Simulation and Results -- Conclusion -- References -- A Collaborative, Secure and Energy Efficient Intrusion Detection Method for Homogeneous WSN -- Introduction -- Related Works -- Contributions -- Network Deployment -- Algorithm and Probability Analysis -- Single Sensing Detection Model -- Multi Sensing Detection Model -- Simulation and Verification -- Conclusions -- References -- An Efficient and Hybrid Key Management Scheme for Three Tier Wireless Sensor Networks Using LU Matrix -- Introduction -- Related Works -- Our Contributions -- Preliminaries -- Notations Used -- WSN Architecture -- Proposed Scheme -- Security Analysis -- Performance Analysis -- References -- Grey System Theory-Based Energy Map Construction for Wireless Sensor Networks -- Introduction -- Related Work -- Prediction Based Energy Map -- Energy Map -- The Protocol -- Grey System Theory-Based Energy Map -- The GM(1, 1) Model -- Simulation Results -- Optimal Sequence Length -- Predicted Value and Correct Value of Energy -- Conclusion -- References -- An Entropic Approach to Data Aggregation with Divergence Measure Based Clustering in Sensor Network -- Introduction -- Related Work -- Proposed Divergence Measure Based Clustering Technique -- Preliminary Clustering Phase -- Final Clustering Phase -- Proposed Data Fusion Algorithm Using Fuzzy-Entropy -- Simulation and Performance Evaluations -- Conclusion -- References -- Energy Efficient Routing Protocols for Wireless Sensor Networks Using Spatial Correlation Based Collaborative Medium Access Control -- Introduction -- Related Work -- Proposed Model -- Spatial Correlation in Wireless Sensor Networks -- Distortion Constraint -- Simulation Results for Distortion Constraint -- Collaborative Based Medium Access control (CC-MAC) -- Iterative Node Selection Algorithm -- Routing Algorithms |
Title | Advances in Computing and Communications, Part III |
URI | https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=3067030 |
Volume | 192 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT4MwGG7cdtGLOjV-pwdvE8NHoXDclpltUS9uZrelhTZiIpoJl_163_JRtrnE6IUAISXwlPbtw_s8L0I3JhWSudwzIFT2DOUxZQTCDQ1JmU2oB0G0o7TDj0_ecErGM3dWu_nl6pKU34XLrbqS_6AK5wBXpZL9A7K6UTgB-4AvbAFh2G4Ev_qwTC0u_tx_FZo9VZeh0hquCT5KE_5F2hmNNDva5Voc3X2LU00H97Iqz301Pfc5W2ZFZeuxavY1rjNJ2PtnXJDKPCtJ1ajmQ9fog4o-7JTuWsorfZvDVq72UHQRtYoKtHr0LErZbZhWD3p9tRaBEaSBGjSwm6jVHYwfXjT9Bd8-BCemUttUzfqFH1J9mx_TYz7nTw5QSyghyCHaEUkb7VflL3A5GrbR3oqX4xGyK0xwnGCNCQZM8Domt1ghggGRYzS9H0z6Q6MsSGFEAYR90PekxU2bm0yaTBCbUodKR0LIw32fcIi9fEuSyIFVdUBgIWw5IYss6P-MulT4lnOCmslHIk4RFpbnSVjLcRa6RBDhS2YHzJUOd2xOPXaGcPXs8_y3eZmrO6_f7Pnvl1yg3RrzS9RMF5m4giAq5dclIN_Qyhsy |
link.rule.ids | 307,786,790,792 |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Advances+in+Computing+and+Communications%2C+Part+III&rft.au=Abraham%2C+Ajith&rft.au=Buford%2C+John&rft.au=Suzuki%2C+Junichi&rft.au=Thampi%2C+Sabu+M&rft.date=2011-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783642227196&rft.volume=192&rft.externalDocID=EBC3067030 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783642227196/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783642227196/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783642227196/sc.gif&client=summon&freeimage=true |