
Computer Networks and Information Technologies
Beschreibung
Alles über E-Books | Antworten auf Fragen rund um E-Books, Kopierschutz und Dateiformate finden Sie in unserem Info- & Hilfebereich.
Weitere Details
Weitere Ausgaben
Inhalt
- Intro
- Title
- Preface
- Organization
- Table of Contents
- Full Papers
- Solar Cell - A Novel Process Control Transducer
- Introduction
- Solar Cell Device: Fabrication and I-V Electrical Characteristic
- Solar Cell as a Process Control Transducer
- Temperature Measurement
- Displacement Measurement
- Speed/Velocity of Moving Object
- Measurement of Pressure and Level
- Sensitivity and Reliability
- Sensitivity
- Reliability
- Experimental Investigation: Displacement Measurement and Its Validation with Computed Value
- Data Acquisition
- Calibration
- Results and Discussion
- Conclusions
- References
- A Hybrid Aggregation Technique for Continuous-Monitoring in Wireless Sensor Networks
- Introduction
- Network Model, Proposed Scheme and Application
- WSN Model
- Proposed Scheme
- Application -- Power System Model Consideration
- Results and Discussion
- Conclusion
- References
- FLD-SIFT: Class Based Scale Invariant Feature Transform for Accurate Classification of Faces
- Introduction
- FLD-Based SIFT Descriptors
- Computation of Patch Fisherspace
- Experimental Results
- Conclusion
- References
- Understanding the Performance of Multi-core Platforms
- Introduction
- Motivation
- Contribution
- Tools Used
- Benchmarks
- Summary of Results and Avenues for Future Research
- Conclusion
- References
- Improvisation of E-Learning System Using Web Services Composition
- Introduction
- New Challenges and Requirements
- Web Services Composition to Increase the Performance
- Proposed Technique
- Real Open Smart Classroom
- Real Open Smart Platform
- New Features
- Three Communication Schemes in Real Open Smart Platform
- Connecting Multiple Classrooms in an Open Network Using Web Services Composition
- Advantages of Web Services Composition for Real Open Smart Classroom
- System Analysis
- Related Work
- Existing Learning System
- Conclusion and Future Work
- References
- Artificial Neural Network Based Contingency Ranking
- Introduction
- Voltage Collapse
- Artificial Neural Networks
- Case Study and Results
- Conclusion
- References
- Detection and Tracking of Moving Object in Compressed Videos
- Introduction
- Proposed System
- Tracking of Moving Objects in Compressed Vidoes
- Experimental Results
- Object Detection
- Tracking Based on Multiple Feature Approach
- Conclusion
- References
- An Enhanced Round Robin Policy for Real Time Traffic
- Introduction
- Round Robin Scheduling
- Proposed Algorithm
- Case Studies
- For Simple Round Robin Algorithm
- For Proposed Algorithm
- Enhanced Model for Policy Based Routing
- Conclusion and Future Work
- References
- A Novel Reconfigurable Video Burst Processor Offering High QoS
- Introduction
- Methodology
- Video Burst
- Markov Process
- Optimization Parameters
- Simulation Model
- Simulation Results
- Reconfigurability
- Conclusion
- References
- Public Key Cryptography Based Approach for Securing SCADA Communications
- Introduction
- Key Challenges and Related Work
- Proposed Methodology
- Conclusion
- References
- gBeL: An Efficient Framework for e-Learning Using Grid Technology
- Introduction
- Use-Case Diagram for E-Learning
- Grid Based E-Learning [gBeL]
- gBeL Component Model
- gBeL Framework
- Implementation Scenario
- Conclusion
- References
- An Algorithm Design to Evaluate the Security Level of anInformation System
- Introduction
- Background
- Proposed Algorithm
- Test Case
- Conclusion and Future Work
- References
- Multi-agent Based Dynamic Data Integrity Protection in Cloud Computing
- Introduction
- Related Works
- Proposed Model
- Concept Validation
- Conclusion
- References
- Design of Efficient Reversible Parallel Binary Adder/Subtractor
- Introduction
- Literature Survey
- Proposed Model
- Full Adder/Subtractor - Design I
- Full Adder/Subtractor - Design II
- Full Adder/Subtractor - Design III
- Reversible Eight-Bit Parallel Binary Adder/Subtractor
- Results
- Reversible Full Adder/Subtractor
- Reversible Eight-Bit Parallel Binary Adder/Subtractor
- Conclusions
- References
- A Computationally Simplified Numerical Algorithm for Evaluating a Determinant
- Introduction
- A New Numerical Method for Evaluating a Determinant
- Numerical Algorithm for Proposed Method
- Numerical Illustrations
- Illustration 1
- Illustration 2
- Illustration 3
- Result Analysis and Discussion
- Conclusion
- References
- Deriving Association between Learning Behavior and Programming Skills
- Introduction
- Motivation
- Learning Behavior
- Criterion-Referenced Model
- K-Means Approach
- Multi-layer Perceptron
- DALP Approach
- Results and Discussion
- Conclusion
- References
- Analysis of a New Base Station Receiver for Increasing Diversity Order in a CDMA Cellular System
- Introduction
- Proposed Receiver Structure
- Performance Analysis
- Numerical Results
- Conclusion
- References
- An Improved SRS Document Based Software Complexity Estimation and Its Robustness Analysis
- Introduction and Related Work
- Introduction to Improved Requirement Based Complexity Measure (I-RBC)
- Results
- Robustness Analysis with Complexity Properties
- Conclusions
- References
- A Novel Model for Software Effort Estimation Using Exponential Regression as Firing Interval in Fuzzy Logic
- Introduction
- Membership Functions
- Cost Estimation Models Literature Review
- COCOMO81 Model
- COCOMO II Model
- Doty: [1]
- Mittal Model: [1]
- Proposed Model Effort Estimation Using Fuzzy
- Fuzzification
- Defuzzification
- Research Methodology
- Experimental Result Analysis
- Conclusion and Future Scope
- References
- Fault Informant Distributed Deadlock Detection Using Colored Probes
- Introduction
- Motivation
- Proposed Scheme
- Correctness of the Algorithm
- Conclusion
- References
- Experiments with a Behavior-Based Robot
- Introduction
- Architecture of the System
- Hybrid Control
- Probable Mathematical Model
- Experiments
- Results and Discussion
- Simulation Result
- Experimental Result
- Discussion
- Conclusions
- References
- Investigation of Channel Capacity of Railway Power Lines for Track and Level Cross Monitoring Application
- Introduction
- Electric Power Distribution System of Indian Railways
- Analytical Model of Railway Powerlines
- Results and Findings
- Conclusion
- References
- A Distributed Weighted Cluster Based Routing Protocol for MANETs
- Introduction
- Proposed Algorithm
- Formation of Clusters
- Running Mobility
- Cluster Maintenance
- Performance Analysis
- No of Clusterheads Formed vs. No of Nodes
- No. of Control Messages vs. No. of Nodes
- Conclusions
- References
- ReeRisk -A Decisional Risk Engineering Framework for Legacy System Rejuvenation through Reengineering
- Introduction
- ReeRisk (Reengineering Risk) Framework Architecture
- ReeRisk Process
- Components of ReeRisk Framework
- System Domain
- Managerial Domain
- Technical Domain
- Conclusion
- References
- Quantitative and Qualitative Comparison Study of Reference Based Time Synchronization Approach in Wireless Sensor Network
- Introduction
- Existing Approaches to Time Synchronization
- Proposed Time Synchronization Scheme
- Evaluation and Comparison
- Quantitative Evaluation
- Qualitative Evaluation
- Conclusion
- References
- Efficient Video Streaming in Wireless P2P Network Using HIS-MDC Technique
- Introduction
- Related Works on MDC
- HIS-MDC Architecture
- Encoder and Decoder
- Spatial and Temporal Interpolation
- System Scenario
- Experimental Results
- Conclusion
- References
- A Novel Framework for Target Tracking and Data Fusion in Wireless Sensor Networks Using Kernel Based Learning Algorithm
- Introduction
- Target Detection, Tracking and Data Fusion
- Proposed Framework Using Kernel Based Learning Algorithm
- Kernel Based Target Tracking [9, 10]
- Conclusion
- References
- Low Power Lapped Bi-orthogonal Transform (LBT) for FPGA's
- Introduction
- Lifting-Based Lapped BiOrthogonal Transform
- Proposed LBT
- Basic LBT
- Fast LBT (Decimation in Frequency) and Proposed LBT
- Results and Discussions
- Area, Power and Time Utilization
- Simulation Results
- Conclusion
- References
- CASE-JigDFS: Context-Aware, Smart and Efficient JigDFS Network
- Introduction
- CASE-JigDFS Network
- Test Results and Discussions
- Conclusion and Future Work
- References
- Novel Stock Market Prediction Using a Hybrid Model of Adptive Linear Combiner and Differential Evolution
- Introduction
- Development of a Hybrid ALC-DE Based Prediction Model
- Simulation Study and Discussion on Results
- Conclusions
- References
- Secure Self Organization of Wireless Sensor Network: A Need Based Approach Using Certificate Less Public Key Infrastructure
- Introduction
- Related Work
- Proposed Need Based Security
- Low Security
- Medium Security
- High Security
- Analysis
- Conclusion
- References
- Design of High Resolution, Fast Locking, Low Power Multiphase-Output Delay Locked Loop
- Introduction
- Multiphse Output DLL
- Calculation and Results
- Locking Time and Locking Range
- Charge Pump with Loop Filter
- Control Circuit
- Conclusion
- References
- Dynamic Materialized View Selection Approach for Improving Query Performance
- Introduction
- Related Works
- Dynamic Selection of Views
- Query Processing Cost
- View Maintenance Cost
- Total Query Cost
- Dynamic View Selection Algorithm
- Experimental Results
- Comparison with Related Work
- Conclusions
- References
- Approximate Pattern Matching for DNA Sequence Data
- Introduction
- Related Work
- Proposed Approach
- Algorithm for Finding Fuzzy Levenshtein Distance
- Algorithm for Finding Total Number of Fuzzy Patterns Using Fuzzy Levens-htein Distance
- Results and Discussion
- Conclusions and Future Work
- References
- DFIG Based Wind Energy System (WES)
- Introduction
- Modelling of DFIG Based WECS
- Simulation Study and Results
- Conclusion
- References
- Modelling and Voltage Stability Enhancement Using "Sen" Transformer
- Introduction
- Modelling of Sen Transformer
- Testing
- Simulation and Results
- Conclusion
- References
- DBAM: Novel User Based Bandwidth Allocation Mechanism in WiMAX
- Introduction
- Existing Bandwidth Allocation Algorithm
- Differentiated Bandwidth Allocation Mechanism
- Implementation
- Analytical Modeling
- Results and Discussion
- Conclusion
- References
- Applying a Predictive Approach for QoS Monitoring in Web Service
- Introduction
- Approach
- Implementation and Experiments
- Conclusion and Future Work
- References
- An Effective Performance of Fuzzy Hierarchical Clustering Using Time Series Data Streams
- Introduction
- Methodology
- Hierarchical Clustering
- Clustering Time Series Data Stream
- Online Divisible Agglomerative Clustering
- Fuzzy Clustering
- Fuzzy Hierarchical Clustering Algorithm
- Experimental Results
- Clustering Validity
- Hierarchical Quality
- System Performance on ECG Data
- Scalability Evaluation
- Conclusion
- References
- Credit Scoring Using PCA-SVM Hybrid Model
- Introduction
- Literature Review
- Proposed Approach
- Support Vector Machine (SVM)
- Logistic Regression
- Dataset Description
- Results and Discussions
- Conclusions
- References
- Energy Efficient Data Aggregation and Routing in Wireless Sensor Networks
- Introduction
- Proposed Work
- Contributions
- Simulation Model and Performance Metrics
- Results and Discussions
- Node's Battery Usage
- Delay vs Nodes
- Conclusions
- References
- Poster Papers
- Design of High Speed Optimized Flash ADC
- Introduction
- Flash ADC Architecture with Two Step Approach
- ADC Components Optimization
- Conclusion
- References
- Alleviating the Data Loss in Congested Sensor Networks Using a Differentiated Routing Methodology
- Introduction
- Active Congestion-Less Routing
- MAC-Enhanced Active Congestion-Less Routing
- Machine for MACR
- Conclusion
- References
- Interoperable Dynamic Composite Web Service
- Introduction
- Dynamic Composite Web Service
- Interoperability Issue in Data Exchange
- Proposed Model for Interoperable Dynamic Composite Web Service with XML Serialization
- Conclusion
- References
- A Message Passing System with Faulty Node Identification for Mobile Agents
- Introduction
- The Broadcast Procedure
- The Experiment
- Result
- References
- Automatic Traffic Signal Controller for Roads by Exploiting Fuzzy Logic
- Introduction
- Fuzzy Based Traffic Signal Controller
- Design Procedure of Fuzzy Controller
- Membership Functions of Input Variables
- Mapping of Crisp Output Variable vs. Input Variable
- Conclusion
- References
- Multimedia Conferencing for MANET in Cluster Based Signaling
- Introduction
- Existing System
- Proposed System
- Cluster Based Signaling Architecture
- Operational Procedures of Clusters
- Result
- References
- Specification Based Test Case Generation Using Classification Tree Method
- Introduction
- Existing System
- Proposed System
- Problem Definition
- System Implementation
- Result
- References
- Mammogram Problem Solving Approach: Building CBR Classifier for Classification of Masses in Mammogram
- Introduction
- Mass Segmentation
- CBR Classifier
- Building Perform Case Base Classifier
- Improving the Accuracy of Perform CB Classifier
- Experimental Results
- Results
- Conclusion
- References
- New Mutants Generation for Testing Java Programs
- Introduction
- Related Work
- Proposed Mutation Operators for Java
- Mutation Operators for Exception Handling
- Mutation Operators for String Handling
- Conclusion
- References
- A Novel Approach to Hindi Text Steganography
- Introduction
- Related Work
- Proposed Algorithm
- Punctuation Marks Based
- Synonym Based
- Sanskrit Classification Based
- Conclusion
- References
- Object Detection and Tracking in Videos Using Snake and Optical Flow Approach
- Introduction
- Proposed System
- Experimental Results
- Tracking by Active Contour Models
- Trcking by Optical Flow Method
- Conclusion
- References
- An Improved Technique for Handling Information Regarding Location of Moving Object
- Introduction
- Proposed System
- Experimental Results
- Implementation
- Conclusion
- References
- Advanced Bioinformatics Approach in Machine Learning for Analyzing Genome Wide Expression Profiles and Proteomic Data Sets
- Introduction
- Types and Methods
- Biological Research Is Database Oriented
- Machine Learning Approaches to Genomic Data Analysis
- Supervised Learning and Classification
- Classifying Gene Function with Support Vector Machines
- Conclusion
- References
- Simulation and Performance Analysis of OLSR under Identity Spoofing Attack for Mobile Ad-Hoc Networks
- Introduction
- The Optimized Link State Routing Protocol
- OLSR Vulnerabilities
- Simulation Results and Analysis
- Conclusion
- References
- Bayesian Belief Networks - Based Product Prediction for E-Commerce Recommendation
- Introduction
- Proposed Approach
- Product Recommendation
- Experimental Results
- Conclusion and Further Work
- References
- Yield Prediction Using Artificial Neural Networks
- Introduction
- Related Work
- Methodologies
- Results and Conclusion
- References
- A Novel Approach for Matrix Chain Multiplication Using Greedy Technique for Packet Processing
- Introduction
- Greedy Approach
- Algorithm and Proof
- Conclusion
- References
- Width of a General Tree for Packet Routing
- Introduction
- Recursive Approach
- Iterative Approach
- Conclusion
- References
- Unified Knapsack Problem
- Introduction
- Types of Knapsack Problem
- Unified Knapsack Problem
- Terms Used in Algorithm
- Explanation of Algorithm
- Simulation and Performance of Algorithm
- Conclusion and Future Scope
- References
- Autonomous System Dealings in the Internet
- Introduction
- Related Work
- Internet Architecture
- Routing Policies
- Routing Table and Topology Table
- Conclusion
- References
- Federated Query Processing Service in Service Oriented Business Intelligence
- Introduction
- Data Integration Techniques
- Related Work
- Proposed Query Decomposition Algorithm
- Experimental Results
- Conclusions and Future Enhancement
- References
- Comparative Study of P2P and Cloud Computing Paradigm Usage in Research Purposes
- Introduction
- The P2P Paradigm
- Underlying Architecture
- The Cloud Computing Paradigm
- Underlying Architecture
- Application of P2P Paradigm for Research Purposes
- Application of the Cloud Computing Paradigm for Research Purposes
- Software (SaaS)
- A Comparative Study of P2P and Cloud Computing Paradigm for Research Purposes
- Conclusion
- References
- Cyclic Prefix Based Modulation Selection Using Comparative Analysis of EVM and RCE for WiMAX Network
- Introduction
- Simulation Background and Modeling Environment
- Modulation Selection Algorithm and Simulation Results
- References
- Experimental Study of Rank 1 Chaos in Chua's Oscillator with Cubic Nonlinearity
- Introduction
- Cubic-Polynomial Chua's Diode and Switch-Controlled Chua's Oscillator
- Experimental Results
- Conclusions
- References
- A Novel Algorithm for the Implementation of PSO-Based SVM
- Introduction
- SVM
- PSO
- Intelligent Initialization of Swarm
- Manner in Which Particles Are Initialized
- Fitness Function
- Software Architecture
- Results
- Conclusions
- References
- Omega Loops of Proteins in Homo Sapiens: Role in Diseases
- Introduction
- Methods
- Results
- 1LN1
- 1NL0
- 3FGQ
- 3PRG
- Discussion
- References
- Voice Record on RISE (Radio Broadcasting Integrated System) on Air Application
- Introduction
- Design and Implementation
- Closing
- Conclusion
- Suggestion
- References
- Design of Hybrid Billboard with Scrolling Static Image and Remotely Updatable Matrix Display
- Introduction
- System Design
- Scrolling Billboard Mechanism
- Electrical System Block Diagram
- Programming Design
- System Test
- Results
- Future Development
- References
- Determining Factors of Online Auction Prices Analysis with Data Mining Algorithms on the Basis of Decision Trees
- Introduction
- Online Auctions and Auction Success
- Dataset
- Decision Trees
- Results
- Conclusion
- References
- A Framework for Efficient Information Retrieval Using NLP Techniques
- Introduction
- System Architecture
- Experimental Setup and Evaluation Measures
- Conclusion
- References
- Modified Graph Spectra Approach for Music Information Retrieval
- Introduction and Background
- Modification and Experiments
- Conclusions
- References
- Comparative Analysis of CK Metrics across Object Oriented Languages
- Introduction
- Research Objective and Evaluation Results
- Conclusion
- References
- Integration of Spatial and Transform Domain in LSB Steganography
- Introduction
- Algorithm
- Performance Analysis
- Conclusions
- References
- Rail Road Strategy for SJF Starvation Problem
- Introduction
- Related Work
- Materials and Method
- Algorithm
- Implementation
- Comparison and Performance
- Conclusion
- References
- A Descriptive Approach towards Data Warehouse and OLAP Technology: An Overview
- Introduction
- Data Warehouse, OLTP and OLAP
- Data Warehouse Support for OLTP Systems
- OLAP as a Data Warehouse Tool
- Data Warehouse Designing: Prerequisite
- Data Warehouse Architecture Goals
- Developing the Data Warehouse: Details
- Identify and Gather Requirements
- Designing the Dimensional Model
- Designing the OLAP Cubes
- Developing the Data Maintenance Application and Analysis Application
- Testing and Deploying the System
- Conclusion
- References
- Energy Consumption Analysis of Multicast Routing Protocols in Wireless Ad Hoc Network Environment
- Introduction
- Related Works
- Multicasting Protocols
- Experimental Results
- Conclusion
- References
- Fuzzy Logic Based Computer Vision System for Classification of Whole Cashew Kernel
- Introduction
- Methods and Material
- RGB Image Acquisition
- Preprocessing and Segmentation
- Feature Extraction
- Classification
- Final Grading
- Conclusion
- References
- Efficiently-Enabled Inclusive Approach Preventing SQL Injection Attacks
- Introduction
- Proposed Approach
- Implementation and Results
- References
- Simulation of Ultrasonic Phased Array Sensors for Time of Flight Measurements
- Introduction
- Principle of Operation
- Modelling of Ultrasonic Signals
- Time of Flight Calculation
- Conclusion
- References
- Short Papers
- Verifying and Enhancing the Correctness of the Dynamic Composite Web Service
- Introduction
- Related Work
- Proposed Model for Testing the Web Service
- Conclusion
- References
- Script Identification for a Tri-lingual Document
- Introduction
- Segmentation
- Feature Extraction
- Rule-Based Classifier
- Experimental Results
- Conclusion
- References
- Analysis of Different Key Distribution Schemes for Distributed Sensor Networks
- Introduction
- Key Distribution Schemes
- The Eschenauer-Gligor (EG) Scheme
- q-Composite Random Key Pre-distribution Scheme
- Peer Intermediaries for Key Establishment (PIKE)
- Blom's Key Pre-distribution Scheme
- The Du-Deng-Han-Varshney (DDHV) Scheme
- Analysis
- References
- Audio Database Watermarking for Tamper Detection
- Introduction
- Audio Database Watermarking
- Proposed Watermarking Model for Audio in DB
- Encoding
- Verification for Tampering
- Search Capability
- Attach Model
- References
- Agent Based Information Aggregation and Routing inWSN
- Introduction
- Proposed Work
- Node Agency (NA)
- Routing Agent (RA)
- Aggregation Agent (AA)
- Conclusion
- References
- Dynamic IP Address Auto-configuration in MANETs
- Introduction
- Related Work
- Ad Hoc IP Address Auto-configuration
- Reason Why Nonce Is Used
- Experimental Results
- Conclusion
- References
- Design of a Low Power High Speed ALU in 45nm Using GDI Technique and Its Performance Comparison
- Introduction
- Low Power High Speed Design Metholodgy using a GDI Cell
- Performance Characteristics Comparison of a 1-Bit ALU
- Number of Transistors Comparison
- Delay Comparison
- Power Dissipation Comparison
- Power - Delay Product Comparison
- Conclusion
- References
- Normalization of Semantic Based Web Search Engines Using Page Rank Algorithm and Hypergraph Based Clustering
- Introduction
- Related Works in Semantic Web Search
- Overview of Ranking Strategy (Proposed Approach)
- Starting Point -- Query Definition Process
- Introduction to Relation Based Ranking
- Basic Idea for Proposed Aproach
- User Interaction
- Clustering of High Dimensional Data
- Query Processing
- Calculation of Relevance Score for Each Page
- Example with Stastical Data
- Conclusions and Future Work
- References
- A New Buyer-Seller Watermarking Protocol with Discrete Cosine Transform
- Introduction
- Proposed Protocol
- Watermark Generation and Extraction Protocol with DCT
- Registration Protocol
- Watermarking Protocol
- Conclusion
- References
- Efficient Non-chronological Dynamic Video Abstraction Using the Rack-Through Method
- Introduction
- Abstract Video
- Proposed System
- Experimental Results
- References
- Target Tracking in Aerial Videos Using Image Registration Techniques
- Introduction
- Proposed System
- Accuracy of Registration
- Experimental Results
- Matching Error Analysis of Image Registration Algorithms
- Conclusion
- References
- Cost Control and Quality Maintenance Metrics for Component- Based Software Development
- Introduction
- Benefits of Reuse on Productivity of Software
- Benefits of Reuse on Quality of Software
- Proposed Scheme
- Fault Detection Metric for CBSD
- Cost Estimation Metric for CBSD
- Analysis
- Analysis of Cost Estimation Metric
- Analysis of Defect Removal Metric
- Conclusion
- References
- Study of Process Variations on ft in 30 nm Gate Length FinFET Using TCAD Simulations
- Introduction
- Simulation Environment
- Results and Discussion
- Variation in Gate Length
- Variation in Underlap
- Variation in Fin Width
- Variation in Corner Radius
- Variation in Hardmask Height
- Conclusion
- References
- A Cluster Based Multi-Radio Multi-Channel Assignment Approach in Wireless Mesh Networks
- Introduction
- Related Work
- Proposed Work
- Simulation
- Conclusion
- References
- VSPACE: A New Secret Sharing Scheme Using Vector Space
- Introduction
- Background
- Vectors and Vector Space
- Vector Space Associated with a Character
- Our Proposal of Secret Sharing
- Initial Phase
- Distribution Phase
- Reconstruction Phase
- Security Analysis
- Conclusions
- References
- Secure Group Deffie-Hellman Key Exchange with ID Based Cryptography
- Introduction
- Related Work
- Proposed Scheme
- Conclusion
- References
- Computing with Enhanced Test Suite Reduction Heuristic
- Introduction
- Background
- CC/CC Pair and Test Suite Reduction
- Proposed Test Suite Reduction Technique
- Objectives
- Experimental Study
- Subject Programs, Faulty Versions and Test Case Pools
- Experiment Instrumentation
- Experimental Analysis
- Conclusion
- References
- Robotic Arm with Finger Movement
- Introduction
- Related Work
- Description of Design
- Servodriver
- Finger Driving Circuit
- Logic for the Code
- Experimental Results
- Implementation and Result
- References
- Impulse Noise Removal in Digital Images Using Image Fusion Technique
- Introduction
- Conversion from RGB to YIQ and YIQ to RGB
- Image Fusion Technique
- Experimental Results
- Conclusion
- References
- Faster Arithmetic and Logical Unit CMOS Design with Reduced Number of Transistors
- Introduction
- Arithmetic and Logical Operations
- Mirror Adder as Subtractor
- Proposed ALU Circuitry
- Discussion on Proposed Circuit
- Progressive Transistor Sizing
- Input Reordering
- Performance
- Conclusion
- References
- Dimensionality Reduction of Data Warehouse Using Wavelet Transformation: An Enhanced Approach for Business Process
- Introduction
- Popular Techniques for Dimensionality Reduction
- Wavelet Transformation
- Procedure
- Implementation
- Conclusion
- References
- Analysis of Adaptive Floating Search Feature Selection Algorithm
- Introduction
- Background
- Proposed Work
- Experimental Results and Analysis
- Conclusions
- References
- Reconfigurable Vlsi Architecture for Graph Color Allocation with Its Chromatic Number
- Introduction
- Operation of the Architecture
- Proposed Hardware Architecture
- Simulation and Synthesis Results
- References
- Hop-Count Filtering: A Successful Security Alongside Spoofed Network Traffic
- Introduction
- Hop Count
- TTL (Time to Live )
- TTL Based HopCount Computation
- Related Work
- Feasibility of Hop Count Filtering
- Hop Count Stability
- Diversity of Hop Count Distribution
- Staying "Alert" to Drdos Attacks
- Blocking Bandwidth Attacks
- Conclusion
- References
- Impulse Noise Reduction Using Mathematical Morphology
- Introduction
- Basic Morphological Operations
- Noise Density (ND) Calculation
- Self Adaptive Median Morphological Filter
- Edge Detection Algorithm
- Experimental Results
- Conclusion
- References
- Improving the QoS Routing for Mobile Ad Hoc Networks
- Introduction
- Unipath and Multipath Routing in MANETs
- Simulation
- Method to Improve AOMDV
- Conclusion and Future Work
- References
- An Approach towards Promoter Database Search Using Hidden Markov Model
- Introduction
- Methodology
- Result and Discussion
- References
- Computational Characterization of CNT-Papain Interactions for Developing a Biosensor
- Introduction
- Computational Methodology
- Results and Discussions
- Conclusion
- References
- A Fast Sentence Searching Algorithm
- Introduction
- Related Work
- Semantic Differences between Pattern and Sentences/Paragraph
- Algorithm
- Theoretical Analysis
- Implementation
- Conclusion and Future Scope
- References
- Early Congestion Detection and Self Cure Routing in Manet
- Introduction
- Early Detection of Congestion and Self Cure Routing Protocol
- Early Congestion Detection Techniques
- Self Cure Routing
- Performance Study
- Simulation Configuration and Performance Metrics
- Varying Number of Connections
- Varying CBR Load
- Conclusion and Future Work
- References
- WCDMA-Third Generation Radio Interface
- Introduction
- Parameters of WCDMA
- Protocol Architecture
- Logical Channels
- Transport Channels
- Physical Channels
- Summary and Proposed Simulation
- References
- Image Registration Using Mexican-Hat Wavelets and Invariant Moments
- Introduction
- Feature Point Extraction Using Scale Interaction of MHW
- A Proposed Registration Algorithm
- Experimental Results
- Conclusion
- References
- Centralized Management Approach for WLAN
- Introduction
- Centralized Approaches for WLAN
- WLAN Network Management Server by Intel
- Meraki Enterprise Cloud Controller
- Cisco WLAN Controller
- Analysis of Centralized Approaches for WLAN
- Conclusion
- References
- A New Metric Based Cluster Head Selection Technique for Increasing the Lifetime of Energy Aware Wireless Sensor Network
- Introduction
- System Model
- The Proposed Scheme
- Initialization Phase
- Cluster Head Selection
- Cluster Formation
- Performance Evaluation
- Conclusion and Future Work
- References
- A Feature Extraction Algorithm with Minimum Entropy for Images
- Introduction
- Proposed Method
- Simulation Results
- Conclusion
- References
- Shot Boundary Detection Algorithm Based on Color Texture Moments
- Introduction
- Proposed Methodology
- Experimental Results
- Conclusion
- References
- Secured and Authentic Communication by Combined Approach of Digital Watermarking and Steganography
- Introduction
- Proposed Work
- Watermark Embedding
- Message Embedding with Encryption
- Message Extraction with Decryption
- Experimental Results
- Perceptibility
- Robustness
- Editing
- Conclusions
- References
- Building and Controlling a Ball and Plate System
- Introduction
- Ball and Plate System
- Mechanical Part Design
- Electrical and Control Parts
- Programming
- Testing, Result and Discussion
- Servo Motor and DT Basic Servo Controller Testing
- Control System Testing and Discussion
- Conclusion and Recommendation
- References
- A VLSI Based Scheme for Implementation of BIBD
- Introduction
- Combinatorial Design
- VLSI Design Process
- Algorithm and Flow of the Design
- Experimental Results
- Conclusion
- References
- On 3D Streaming over Peer-to-Peer Networks
- Introduction
- Non-Linear (3D) Streaming Techniques
- Key Challenges and Proposed Solutions
- Conclusion
- References
- Secure Identity-Based Key Establishment Protocol
- Introduction
- Related Work
- Man-in-Middle Attack in Deffie-Hellman Key Exchange
- Proposed Scheme
- Conclusion
- References
- RSA Based Threshold Cryptography for Secure Routing and Key Exchange in Group Communication
- Introduction
- Threshold Cryptography
- RSA Algorithm
- Why RSA Works
- Diffie Hellman Key Exchange Algorithms
- Examples for New Concept
- References
- Cooperative Caching Strategy in Mobile Ad Hoc Networks
- Introduction
- System Model
- Simulation Results
- Effects of Cache Size
- Effects of Transmission Range
- References
- Enhancement of Color Image Using Forth Order Partial Differential Equation Based on S-Type Enhancement
- Introduction
- Paper Preparation
- Fourth Order PDE
- Normalized the RGB Value
- S-Type Enhancement
- Enhance the Color Level Linearly
- Proposed Algorithm
- Result and Analysis
- Conclusion
- References
- Log Based Recovery with Low Overhead for Mobile Computing Systems
- Introduction and System Model
- Proposed Scheme
- Message Logging
- Global Checkpoint
- Recovery
- Evaluation
- Proof of Correctness
- Conclusion
- References
- Custom Processor Implementation of a Self Clocked Coding Scheme for Low Power RF Communication Systems
- Introduction
- Manchester Encoder
- PLL Based Manchester Decoder
- Digitally Controlled Oscillator (DCO)
- Phase Detector
- Loop Filter
- Implementation Results
- Conclusion
- References
- A Novel Message Routing in Unstructured P2P Using CIS and Ant Search Algorithm
- Introduction
- Related Works
- Proposed Methodology
- Conclusion
- References
- Image Fusion Framework
- Introduction
- Image Registration Using NMI
- Image Fusion
- Quality Analysis of Image Fusion
- Conclusion
- References
- An Enhancement to BioPPISVMExtractor Using Multidimensional Support Vector Machine
- Introduction
- Methods
- Pronoun Resolution
- Protein Name Recognition
- MD-SVM Model
- Feature Selection
- Experiment and Discussion
- Corpus
- Evaluation and Results
- Conclusion
- References
- Industrial Monitoring Using Zigbee Network
- Introduction
- Zigbee Technology
- Experimental Details
- Conclusion
- References
- Erratum: A New Metric Based Cluster Head SelectionTechnique for Increasing the Lifetime of Energy AwareWireless Sensor Network
- Retraction Note to: Hop-Count Filtering: A SuccessfulSecurity Alongside Spoofed Network Traffic
- Author Index
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m.
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.