0

International Conference on Wireless, Intelligent, and Distributed Environment for Communication

eBook - WIDECOM 2018, Lecture Notes on Data Engineering and Communications Technologies

Erschienen am 17.04.2018, 1. Auflage 2018
173,95 €
(inkl. MwSt.)

Download

E-Book Download
Bibliografische Daten
ISBN/EAN: 9783319756264
Sprache: Englisch
Umfang: 0 S., 9.33 MB
E-Book
Format: PDF
DRM: Digitales Wasserzeichen

Beschreibung

This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications.

The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The books structure and content is organized in such a manner that makes it useful at a variety of learning levels.


Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018;
Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems;
Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.

Autorenportrait

Professor Isaac Woungang received his Ph.D. degree in Mathematics from the University of South, Toulon and Var, France in 1994. From 1999 to 2002, he worked as a software engineer in the Photonic Line Systems Group, Nortel Networks, Ottawa, Ontario, Canada. Since 2002, he has been with Ryerson University, where he is now a full professor of Computer Science and Director of the Distributed Applications and Broadband (DABNEL) Lab. Dr. Woungang has published 8 books and over 89 refereed technical articles in scholarly international journals and proceedings of international conferences and symposiums. He has served as Associate Editor of the Computers and Electrical Engineering (Elsevier). He is currently serving as Associate Editor of the International Journal of Communication Systems (Wiley), and Security and Privacy Journal (Wiley). He has Guest Edited several Special Issues with various reputed journals such as IET Information Security, Mathematical and Computer Modeling (Elsevier),Computer Communications (Elsevier), Computers and Electrical Engineering (Elsevier), and Telecommunication Systems (Springer). He has also edited a book on Routing in Opportunistic Networks, by Springer. He is presently a Senior Member of IEEE; and he has served as Chair of Computer Chapter, IEEE Toronto Section, from January 2012 to September 2016.

Professor Sanjay Kumar Dhurandher received the M.Tech., and Ph.D. degrees in Computer Science from the Jawaharlal Nehru University, New Delhi, India. He is currently a Professor with the Division of Information Technology, Netaji Subhas Institute of Technology (NSIT), University of Delhi, New Delhi, India, where he is also the Head of the Information Technology Department. He is even serving as the Head of the Advanced Centre CAITFS, Division of Information Technology, NSIT, University of Delhi. From 1995 to 2000, he was a Scientist/Engineer with the Institute for Plasma Research, Gujarat, India, which is under the Department of Atomic Energy, India. His current research interests include wireless ad-hoc networks, sensor networks, computer networks, network security, underwater sensor networks, opportunistic networks, and cognitive radio networks. Dr. Dhurandher is currently serving as an Associate Editor for the International Journal of Communication Systems and Security and Privacy Journal by John Wiley& Sons. He has also edited a book on Routing in Opportunistic Networks, by Springer. He is presently a Senior Member of IEEE.

Inhalt

Chapter1: Tamper Detection Using Fragile Image Watermarking Based on Chaotic System.- Chapter2: Cryptanalysis and Improvement of a User Authentication Scheme for SIP.- Chapter3: SECURITY AGAINST VAMPIRE ATTACK IN ADHOC WIRELESS SENSOR NETWORK: DETECTION& PREVENTION TECHNIQUES.- Chapter4: Securing Fuzzy Commitment Scheme against Decodability Attack based Cross-matching.- Chapter5: PiFallD: A Portable Fall Detection System.- Chapter6: Analysing, Designing, Implementation and Coding E-commerce through UX.- Chapter7: Performance evaluation of GAER over various crossover techniques in opportunistic networks.- Chapter8: Software ­­­­Performance Measuring Benchmarks.-Chapter9: Texture Analysis of Fruits for its Deteriorated Classification.- Chapter10: Analysis of Packet Size Variation Supporting QoS for Survivable Optical High Speed Networks.- Chapter11: AN IMPROVED HYPRID ALGORITHM FOR WEB USAGE MINING.- Chapter12: Optimal Cache Placement by Identifying Possible Congestion Points in Wireless Sensor Networks.- Chapter13: Automatic Detection of Eczema Using Image Processing.- Chapter14: RECOGNITION OF EMOTIONS OF SPEECH AND MOOD OF MUSIC: A REVIEW.- Chapter15: Estimation of Probability Density Function of Digital Substrate Noise in Mixed Signal System.- Chapter16: Location Aware Data Distribution in P2P Mobile Cloud.- Chapter17: EPR: An Encounter and Probability based Routing Protocol for Opportunistic Networks.- Chapter18: Performance Comparison Simulation Model of Ad Hoc Cloud Network with Cloud Servers.- Chapter19: Path Restoration Versus Link Restoration in Survivable ATM Networks.- Chapter20: Adaptive Error Control Technique for Cluster based Underwater Wireless Sensor Networks.- Chapter21: Analysis of Basic Cognitive Radio and Queuing Based Request Handling.- Chapter22: Time Validity Based Message Transmission for College Activities.

Informationen zu E-Books

„E-Book“ steht für digitales Buch. Um diese Art von Büchern lesen zu können wird entweder eine spezielle Software für Computer, Tablets und Smartphones oder ein E-Book Reader benötigt. Da viele verschiedene Formate (Dateien) für E-Books existieren, gilt es dabei, einiges zu beachten.
Von uns werden digitale Bücher in drei Formaten ausgeliefert. Die Formate sind EPUB mit DRM (Digital Rights Management), EPUB ohne DRM und PDF. Bei den Formaten PDF und EPUB ohne DRM müssen Sie lediglich prüfen, ob Ihr E-Book Reader kompatibel ist. Wenn ein Format mit DRM genutzt wird, besteht zusätzlich die Notwendigkeit, dass Sie einen kostenlosen Adobe® Digital Editions Account besitzen. Wenn Sie ein E-Book, das Adobe® Digital Editions benötigt herunterladen, erhalten Sie eine ASCM-Datei, die zu Digital Editions hinzugefügt und mit Ihrem Account verknüpft werden muss. Einige E-Book Reader (zum Beispiel PocketBook Touch) unterstützen auch das direkte Eingeben der Login-Daten des Adobe Accounts – somit können diese ASCM-Dateien direkt auf das betreffende Gerät kopiert werden.
Da E-Books nur für eine begrenzte Zeit – in der Regel 6 Monate – herunterladbar sind, sollten Sie stets eine Sicherheitskopie auf einem Dauerspeicher (Festplatte, USB-Stick oder CD) vorsehen. Auch ist die Menge der Downloads auf maximal 5 begrenzt.

Weitere Artikel vom Autor "Isaac Woungang/Sanjay Kumar Dhurandher"

Alle Artikel anzeigen