Nabendu Chaki & Natarajan Meghanathan 
Computer Networks & Communications (NetCom) [PDF ebook] 
Proceedings of the Fourth International Conference on Networks & Communications

Support

Computer Networks & Communications (Net Com) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.

€362.73
payment methods

Table of Content

Adhoc and Sensor Networks.- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network.- A Jini Based Implementation for Best Leader Node Selection in MANETs.- A Novel Methodology for Securing Adhoc Network by Friendly Group Model.- Energy Efficient Medium Access Protocol for Clustered Wireless Sensor Networks.- A Design Mode of Streaming Media Transmission and Access in Wireless Video Sensor Network.- PSO-PAC: An Intelligent Clustering Mechanism in Ad hoc Network.- SEMSu S: Semantic Middleware For Dynamic Service –Oriented Sensor Network.- CO2 Gas Sensor Using Resonant Frequency changes in Micro-Cantilever.- Heterogeneous Wireless, WLAN and Mobile Networks.- A mechanism for enhanced performance of Chord DHT in mobile environment.- A Hybrid Model of CLMS and ACLMS Algorithms for Smart Antennas.- Novel Protection from Internal Attacks in Wireless Sensor Networks.- Channel-Usage Model in Underlay Cognitive Radio Networks.- Supporting LTE Networks in Heterogeneous Environment using the Y-Comm Framework.- A Call Admission Control Scheme for Cellular Network to Handle Sudden Influx in a Confined Area.- Distributed Joint Optimal Network Scheduling and Controller Design for Wireless Networks.- On the Estimation Capacity of Equal Gain Diversity Scheme Under Multi-Path Fading Channel.- Low Overhead Time Coordinated Checkpointing Algorithm for Mobile Distributed Systems.- Measurement and Performance Analysis.- Performance evaluation of TCP New Vegas and TCP Newreno on Burstification in an OBS Network.- Performance Enhancement through Optimization in FPGA Synthesis: Constraint Specific Approach.- Performance Optimization of Vehicular Ad hoc Network (VANET) using Clustering Approach.- Performance Evaluation of TCP Congestion Control variants using Ad Hoc On-Demand Distance Vector Routing.- Performance Analysis of Dynamic Source Routing for Ad-hoc Networks Using Active Packet.- Overhead Analysis of AODV, TORA and AOMDV in MANET Using Various Energy Models.-Network Architectures, Protocols and Routing
Low Power and High Speed Adders in Modified Gated Diffusion Input Technique.- Guided Local Search for Optimal GPON/FTTP Network Design.- Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method.- Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries.- Comparison of Routing Protocols – Distance Vector and Fisheye State Routing.- A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Adhoc Networks.- User Behavior and Capability Based Access Control Model and Architecture.- Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks.- An Improved Blind Channel Estimation based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions.- Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System.- Network Operations and Management.- Secure Patient Monitoring and Self-management Using Brain Expression Interpreter.- Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN.- Hybrid Deployment Schemes for Wireless Sensor Networks.- Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties.- Secure Real Time Remote Video Monitoring System.- Fully Self-organized Key Management Scheme in MANET and Its Applications.- A Hierarchical Color Net Model for Smart Grid Security Monitoring.- Chapter 6: Network Security, Trust and Privacy.- A Comprehensive study on Two-factor Authentication with One Time Passwords.- ITRANS encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries.- AB-OR: Improving the efficiency in Onion Routing using Attribute Based Cryptography.- PASIC: A Novel Approach for Page-Wise Web Application Security.- Cryptanalysis of Lo et al.’s password based authentication scheme.- Intrusion Detection in Zero Knowledge System Using Model Checking Approach.- Detecting Malicious users in P2P Streaming Systems by Using Feedback Correlations.- An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words.- Secure Cryptosystem with Blind Authentication.- An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier.- A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain.- The Fourth International Workshop on Network and Communications Security (NCS 2012).- A Strong Pvss Scheme.- Secure Cosine Similarity Computation with Malicious Adversaries.- Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones.- An Efficient Microaggregation Method for Protecting Mixed Data.- Plus/Delta (+/∆) Evaluation to Help Organizations Deliver Projects Effectively.- A Secure Routing Protocol for Manets Against Byzantine Attacks.- Analysis of different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol.- NIZKPDS to achieve Non-Repudiation.- An Integrated Solution for both Monitoring and Controlling for Automization using Wireless Sensor Networks:A Case Study.- A Secure Image Steganography Technique to Hide Multiple Secret Images.- Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities.- Document Library System using RDF based inferences.- The Fourth International workshop on Wireless and  Mobile Networks (Wi Mo Ne-2012).- Spread and Erase: Efficient routing algorithm based on Anti-message Info Relay Hubs for Delay Tolerant Networks.- Novel architecture of adaptive and optimized policy based handover in MANET.- Trusted control information in the application of cold chain logistics.- PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium.- Approximate Minimum Spanning Tree for Points moving in a Euclidean Two-Dimensions Plane.- Low Complexity Speech Enhancement Algorithmfor Improved Perception in Mobile Devices.- Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing.- Multimedia Traffic over MANETs: Evaluation and Performance Analysis.- Web Accessibility : Designing and Testing of Web Based Application for Persons with
Disabilities.- CBADE – Hybrid Approach for Duplication detection and Elimination.- Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC – 2012).- Energy Aware Multipath Routing Protocol for Wireless Sensor Networks.- Virtual Classroom for E – Education in Rural Areas.- Unsupervised Methods On Image Database Using Cluster Mean Average Methods For Image Searching.- Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network.- The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012).- Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis.- Compression of Ecg Signals Using A Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database.- Performance Analysis of ETX and ETT Routing Metrics over AODV Routing Protocol in WMNs.- Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application.- Message Efficient Ring Leader Election in Distributed Systems.- RAW – A novel Reconfigurable Architecture design using Wireless for future generation Supercomputers.- Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code.

About the author

Dr. Nabendu Chaki is Head and Associate Professor of the Deptartment of CSE at the University of Calcutta, India.
Dr. Natarajan Meghanathan is an Associate Professor at Jackson State University, Jackson, Mississippi, USA.
Dr. Dhinaharan Nagamalai is a Network Architect & Security Expert at Wireilla Net Solutions PTY Ltd in Australia.

Buy this ebook and get 1 more FREE!
Language English ● Format PDF ● Pages 865 ● ISBN 9781461461548 ● File size 25.2 MB ● Editor Nabendu Chaki & Natarajan Meghanathan ● Publisher Springer New York ● City NY ● Country US ● Published 2013 ● Downloadable 24 months ● Currency EUR ● ID 2648650 ● Copy protection Social DRM

More ebooks from the same author(s) / Editor

18,612 Ebooks in this category