Advances in Computing and Communications, Part III First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part III

Saved in:
Bibliographic Details
Main Authors Abraham, Ajith, Buford, John, Suzuki, Junichi, Thampi, Sabu M, Lloret Mauri, Jaime
Format eBook
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin / Heidelberg 2011
Edition1
Subjects
Online AccessGet full text

Cover

Loading…
Author Suzuki, Junichi
Lloret Mauri, Jaime
Thampi, Sabu M
Abraham, Ajith
Buford, John
Author_xml – sequence: 1
  fullname: Abraham, Ajith
– sequence: 2
  fullname: Buford, John
– sequence: 3
  fullname: Suzuki, Junichi
– sequence: 4
  fullname: Thampi, Sabu M
– sequence: 5
  fullname: Lloret Mauri, Jaime
BookMark eNotjMtOwzAQAI14iLbkH3LjQqT1rt21jyUqEKkSHOBcOYmNAq1d4pTvB0TnMprLzMVFTNGficKyoaVCREbAczE_hbTmSsxYK5ZMBNeiyPkDftEEbGAmcNV_u9j5XA6xrNP-cJyG-F662P_V_hiHzk1DivmufHHjVDZNcyMug9tlX5y8EG8P69f6qdo8Pzb1alP1VmpbIQTZArbgAjivkJk4UJBGt8aoVoM1MqieGKVV0kpJneslonGs2RtJC3H7_z2M6evo87T1bUqfnY_T6Hbb9X1NsGQgoB_KEEW-
ContentType eBook
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783642227202
3642227201
Edition 1
ExternalDocumentID EBC3067030
GroupedDBID -T.
089
0D6
0DA
38.
9-X
A4J
AABBV
AAFYB
AAMFE
ABBVZ
ABFCV
ABMNI
ABTMC
AECAB
AECMQ
AEGQK
AEHWL
AEKFX
AETDV
AEZAY
AFNRJ
ALMA_UNASSIGNED_HOLDINGS
ANXAN
AZZ
BBABE
C9S
C9V
CZZ
I4C
IEZ
JJU
MA.
NUC
SAO
SBO
SNUHX
TCUKC
TPJZQ
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z82
Z83
Z84
Z85
Z87
Z88
ID FETCH-LOGICAL-d9159-20f1b02b0af0ae427737f3f185b884b50981f4d37219419113cad1228a757e813
ISBN 3642227198
9783642227196
IngestDate Tue Jan 30 00:30:37 EST 2024
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident QA75.5-76.95
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-d9159-20f1b02b0af0ae427737f3f185b884b50981f4d37219419113cad1228a757e813
OCLC 754717330
PQID EBC3067030
PageCount 715
ParticipantIDs proquest_ebookcentral_EBC3067030
PublicationCentury 2000
PublicationDate 2011
PublicationDateYYYYMMDD 2011-01-01
PublicationDate_xml – year: 2011
  text: 2011
PublicationDecade 2010
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationYear 2011
Publisher Springer Berlin / Heidelberg
Publisher_xml – name: Springer Berlin / Heidelberg
SSID ssj0000530780
Score 1.8781579
SourceID proquest
SourceType Publisher
SubjectTerms Congresses
Electronic data processing
Subtitle First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part III
TableOfContents System Architecture -- Random Number Generator Based Multi-modulation Software Defined Radio Transmitter -- Adaptive SDR Receiver -- Platform Used -- System Level Simulations -- Conclusion and Future Scope -- References -- Abstraction of Exudates in Color Fundus Images -- Introduction -- Related Works -- Proposed Method -- Image Acquisition -- Preprocessing -- Retinal Image Segmentation -- Feature Selection -- Region Level Classification -- Results -- Conclusion -- References -- A Histogram Adaptation for Contrast Enhancement -- Introduction -- Histogram Adaptation -- Methodologies -- Adjustable Histogram Equalization -- Histogram Smoothing -- Weighted Histogram Approximation -- Low-Complexity Histogram Modification Algorithm -- Results and Discussion -- Conclusion -- References -- Evaluating the Performance of a Speech Recognition Based System -- Introduction -- Evaluation without Testing -- Case Study -- Conclusion -- References -- Unified Approach in Food Quality Evaluation Using Machine Vision -- Introduction -- Quality Evaluation Using Machine Vision -- Assesment of Food Products -- Proposed Unified Approach for Quality Evaluation -- Conclusion -- References -- Mach-Zehnder Interferometer Based All-Optical Peres Gate -- Introduction -- SOA Based MZI Switch -- Peres Gate (PG) Architecture and Its Simulation -- Peres Gate (PG) Configuration Using MZI -- Functional Operations -- Simulation and Performance Evaluation -- Concluding Remarks -- References -- Using PSO in Image Hiding Scheme Based on LSB Substitution -- Introduction -- Particle Swarm Optimization -- Proposed Technique -- Extraction of Secret Image -- Experimental Results -- Conclusions -- References -- Matrix Embedding Using Random Linear Codes and Its Steganalysis -- Introduction -- Basic Concepts -- Matrix Embedding
Matrix Embedding Using Random Linear Codes for Large Relative Payloads
Title -- Preface -- Organization -- Table of Contents -- Security, Trust and Privacy -- Chaotic Integrity Check Value -- Introduction -- Proposed Hash Function -- Strengthening the Proposed Hash Function -- Scheme A -- Scheme B -- Results and Analysis -- Checking for Collisions in the Whole Space -- Sensitivity of Proposed Keyed Hash Function with Respect to Input Message -- Sensitivity of Control Parameter -- Sensitivity of Initial Value -- Collision Analysis -- Conclusions -- References -- An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers -- and Their Countermeasures -- Introduction -- Advanced Keylogger Characteristics -- Keylogger Methodology: Stealth and Persistence -- Keylogger Malware Statistics -- Anti-keylogger Analysis -- Mitigation Techniques Users -- Multifactor Authentication to Thwart Password Stealing [10] -- Scratch List -- Time Based -- Challenge Response Based -- Our Solution -- Advantages -- Disadvantage -- Conclusion -- References -- Cancelable Biometrics for Better Security and Privacy in Biometric Systems -- Introduction -- Cancelable Biometrics: Related Work -- A Biometric Data Shuffling Scheme to Create Cancelable Biometric Templates -- The Shuffling Technique -- Advantages of Using the Proposed Shuffling Scheme -- Experimental Setup -- Experimental Results and Security Analysis -- Results and Security Analysis on Iris Modality -- Results and Security Analysis on Face Modality -- Conclusions and Perspectives -- References -- Advanced Clustering Based Intrusion Detection (ACID) Algorithm -- Introduction -- Intrusion -- Intrusion Detection and Its Importance -- Clustering -- Introduction -- Clustering in Intrusion Detection -- Advanced Clustering Based Intrusion Detection (ACID) Algorithm -- Introduction -- Analysis of the Problem -- Solution Strategy -- Various Modules or Functions Used
Simulation Results -- Comparison of End to End Delay with AODV, DSR, DSDV -- Comparison of Packet Delivery Ratio with AODV, DSR, DSDV -- Comparison of Packet Loss with AODV, DSR, DSDV -- Comparison of Energy Consumption with AODV, DSR, DSDV -- Conclusion and Future Work -- References -- Signal and Image Processing -- Palmprint Authentication by Phase Congruency Features -- Introduction -- Palmprint Authentication System -- Feature Extraction Using Phase Congruency Features -- Feature Matching -- Euclidean Distance Similarity Measurement -- Reference Threshold -- Experimental Results and Analysis -- Palmprint Authentication System -- Reference Threshold Calculation -- Conclusion -- References -- Design and Implementation of 3D DWT for 4D Image Based Noninvasive Surgery -- Introduction -- 3D Discrete Wavelet Transform for 4D Imaging -- Proposed 3D DWT for 4D Imaging -- Simulink Model Design of 3D-DWT -- Result and Discussion -- Conclusion -- References -- Stratified SIFT Matching for Human Iris Recognition -- Introduction -- Conventional SIFT Matching -- Stratified SIFT Matching -- Strata I: SIFT Matching -- Strata II: Gradient Based Filtering -- Strata III: Scale Based Filtering -- Experimental Results -- Conclusions -- References -- Quality Index Based Face Recognition under Varying Illumination Conditions -- Introduction -- Image Quality Index Based Face Recognition -- Results and Discussion -- Conclusion -- References -- Noise Adaptive Weighted Switching Median Filter for Removing High Density Impulse Noise -- Introduction -- Noise Models -- Noise Adaptive Weighted Switching Median (NAWSM) Filter -- Noise Detection Stage -- Noise Filtering Stage -- Performance Measures -- Results and Discussion -- Conclusion -- References -- SMT-8036 Based Implementation of Secured Software Defined Radio System for Adaptive Modulation Technique -- Introduction
Results and Discussion -- Conclusions -- References -- Measuring the Deployment Hiccups of DNSSEC -- Introduction -- Background -- Domain Name System (DNS) -- DNS Security Extensions (DNSSEC) -- Methodology -- PlanetLab -- Tor -- Data Collection -- Results -- Node Categorization -- Failure Patterns -- Related Work -- Conclusion -- References -- Sensor Networks -- Self-organizing MAC Protocol Switching for Performance Adaptation in Wireless Sensor Networks -- Introduction -- Background -- Related Work -- Proposed Dynamic MAC Protocol Switching -- Protocol Adaptations -- Adaptations of CSMA/CA for TDMA Coexistence -- Adaptation of TDMA for CSMA/CA Coexistence -- MAC Protocol Switching Logic -- Influencing Switching Parameters -- Switching Criteria -- Experimental Evaluation -- Switching in Response to Changes in Data Rate -- Switching in Response to Number of Active Nodes -- Switching with Spatially Clustered Traffic -- Conclusions and Ongoing Work -- References -- DFDNM: A Distributed Fault Detection and Node Management Scheme for Wireless Sensor Network -- Introduction -- Cellular Automata -- Mathematical Analysis -- Energy Requirement for Wireless Communication -- Fault Detection -- Proposed DFDNM Approach -- Experimental Results -- Conclusions -- References -- An Optimized Reduced Energy Consumption (OREC) Algorithm for Routing in Wireless Sensor Networks -- Introduction -- Related Work -- Proposed Method -- The Node Deployment Protocol -- The Realistic Power Model -- Optimized Reduced Energy Consumption (OREC) Algorithm -- Simulation Results -- Conclusion and Future Work -- References -- Improving Energy Efficiency of Underwater Acoustic Sensor Networks Using Transmission Power Control: A Cross-Layer Approach -- Introduction -- Related Work -- Transmission Power Control to Enhance Energy Efficiency -- Overview of RMAC
RMAC with Power Control (RMAC-PC) -- Simulation and Results -- Conclusion -- References -- A Collaborative, Secure and Energy Efficient Intrusion Detection Method for Homogeneous WSN -- Introduction -- Related Works -- Contributions -- Network Deployment -- Algorithm and Probability Analysis -- Single Sensing Detection Model -- Multi Sensing Detection Model -- Simulation and Verification -- Conclusions -- References -- An Efficient and Hybrid Key Management Scheme for Three Tier Wireless Sensor Networks Using LU Matrix -- Introduction -- Related Works -- Our Contributions -- Preliminaries -- Notations Used -- WSN Architecture -- Proposed Scheme -- Security Analysis -- Performance Analysis -- References -- Grey System Theory-Based Energy Map Construction for Wireless Sensor Networks -- Introduction -- Related Work -- Prediction Based Energy Map -- Energy Map -- The Protocol -- Grey System Theory-Based Energy Map -- The GM(1, 1) Model -- Simulation Results -- Optimal Sequence Length -- Predicted Value and Correct Value of Energy -- Conclusion -- References -- An Entropic Approach to Data Aggregation with Divergence Measure Based Clustering in Sensor Network -- Introduction -- Related Work -- Proposed Divergence Measure Based Clustering Technique -- Preliminary Clustering Phase -- Final Clustering Phase -- Proposed Data Fusion Algorithm Using Fuzzy-Entropy -- Simulation and Performance Evaluations -- Conclusion -- References -- Energy Efficient Routing Protocols for Wireless Sensor Networks Using Spatial Correlation Based Collaborative Medium Access Control -- Introduction -- Related Work -- Proposed Model -- Spatial Correlation in Wireless Sensor Networks -- Distortion Constraint -- Simulation Results for Distortion Constraint -- Collaborative Based Medium Access control (CC-MAC) -- Iterative Node Selection Algorithm -- Routing Algorithms
Title Advances in Computing and Communications, Part III
URI https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=3067030
Volume 192
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT4MwGG7cdtGLOjV-pwdvE8NHoXDclpltUS9uZrelhTZiIpoJl_163_JRtrnE6IUAISXwlPbtw_s8L0I3JhWSudwzIFT2DOUxZQTCDQ1JmU2oB0G0o7TDj0_ecErGM3dWu_nl6pKU34XLrbqS_6AK5wBXpZL9A7K6UTgB-4AvbAFh2G4Ev_qwTC0u_tx_FZo9VZeh0hquCT5KE_5F2hmNNDva5Voc3X2LU00H97Iqz301Pfc5W2ZFZeuxavY1rjNJ2PtnXJDKPCtJ1ajmQ9fog4o-7JTuWsorfZvDVq72UHQRtYoKtHr0LErZbZhWD3p9tRaBEaSBGjSwm6jVHYwfXjT9Bd8-BCemUttUzfqFH1J9mx_TYz7nTw5QSyghyCHaEUkb7VflL3A5GrbR3oqX4xGyK0xwnGCNCQZM8Domt1ghggGRYzS9H0z6Q6MsSGFEAYR90PekxU2bm0yaTBCbUodKR0LIw32fcIi9fEuSyIFVdUBgIWw5IYss6P-MulT4lnOCmslHIk4RFpbnSVjLcRa6RBDhS2YHzJUOd2xOPXaGcPXs8_y3eZmrO6_f7Pnvl1yg3RrzS9RMF5m4giAq5dclIN_Qyhsy
link.rule.ids 307,786,790,792
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Advances+in+Computing+and+Communications%2C+Part+III&rft.au=Abraham%2C+Ajith&rft.au=Buford%2C+John&rft.au=Suzuki%2C+Junichi&rft.au=Thampi%2C+Sabu+M&rft.date=2011-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783642227196&rft.volume=192&rft.externalDocID=EBC3067030
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783642227196/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783642227196/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783642227196/sc.gif&client=summon&freeimage=true