Login

Bhateja, Vikrant

Computer Communication, Networking and Internet Security

Bhateja, Vikrant - Computer Communication, Networking and Internet Security, ebook

475,10€

Ebook, PDF with Adobe DRM
ISBN: 9789811032264
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Approach Towards Increasing Efficiency of Communication Protocol in Wireless Sensor Network Using Modified Routing Protocol
Rashmi Jain, Abhinav Kumar, Kunal Gupta

2. Anomaly Detection System in a Cluster Based MANET
Vikram Narayandas, Sujanavan Tiruvayipati, Madusu Hanmandlu, Lakshmi Thimmareddy

3. Temperature Data Transfer Using Visible Light Communication
Sindhubala Kadirvelu, Vijayalakshmi Baba

4. A New Approach for Data Security in Cryptography and Steganography
Prashanti Guttikonda, Sandhya Rani Kaviti, Ashok Kumar Popuri

5. Improvement of Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network
Ankita Singla, Deepali

6. Computationaland Emotional Linguistic Distanceand Language Learning
Krishnaveer Abhishek Challa, Mounika Vurity

7. Collaborative Attack Effect Against Table-Driven Routing Protocols for WANETs: A Performance Analysis
E. Suresh Babu, Satuluri Naganjaneyulu, P. S. V. Srinivasa Rao, M. Srinivas Rao

8. Body Biased High Speed Full Adder to LNCS/LNAI/LNBI Proceedings
D. Khalandar Basha, B. Naresh, S. Rambabu, D. Nagaraju

9. Optimization of Contiguous Link Scheduling
Hardik Gupta, Siddhesh Mhatre, M. M. Chandane, Akshita Shah, Shreeya Laad

10. A Novel Reversible EX-NOR SV Gate and Its Application
D. Krishnaveni, M. Geetha Priya

11. Internet of Things and Wireless Physical Layer Security: A Survey
Ankit Soni, Raksha Upadhyay, Anjana Jain

12. Privacy Preservation in Cloud Computing with Double Encryption Method
K. Shivanna, S. Prabhu Deva, M. Santoshkumar

13. A Machine Learning Based Approach for Opinion Mining on Social Network Data
Fayeza Arif, Uma N. Dulhare

14. Congestion Control Mechanism for Real Time Traffic in Mobile Adhoc Networks
Mamata Rath, Umesh Prasad Rout, Niharika Pujari, Surendra Kumar Nanda, Sambhu Prasad Panda

15. Correction of Ocular Artifacts from EEG by DWT with an Improved Thresholding
Vijayasankar Anumala, Rajesh Kumar Pullakura

16. EGRP: Enhanced Geographical Routing Protocol for Vehicular Adhoc Networks
N. V. Dharani Kumari, B. S. Shylaja

17. PAPR Performance Analysis of Unitary Transforms in SLM-OFDM for WLAN 802.11a Mobile Terminals
Sukanya Kulkarni, B. K. Mishra

18. Optimal Sensing Time Allocation for Energy Efficient Data Transmission in Amplify-Forward Cognitive Relay Assisted Network
Sutanu Ghosh, Aditya Chaudhuri, Sayantani Ghosh

19. Data Privacy in Online Shopping
Shashidhar Virupaksha, Divya Gavini, D. Venkatesulu

20. Design and Performance of Resonant Spacing Linear Patch Array with Quarter Wave Transformer Feed Network for Wireless Applications
D. Prabhakar, P. Mallikarjuna Rao, M. Satyanarayana

21. Performance Analysis of PUEA and SSDF Attacks in Cognitive Radio Networks
D. L. Chaitanya, K. Manjunatha Chari

22. Design of a 3.4 GHz Wide-Tuning-Range VCO in 0.18 μm CMOS
Ningampalli Ramanjaneyulu, Donti Satyanarayana, Kodati Satya Prasad

23. A New Iterative Hybrid Edge Technique Using Image Mosaic
D. Surya Kumari, S. A. Bhavani

24. Time Series Analysis of Oceanographic Data Using Clustering Algorithms
D. J. Santosh Kumar, S. P. Vighneshwar, Tusar Kanti Mishra, Satya V. Jampana

25. Cluster Based Prediction of Keyword Query Over Databases
K. Geethanjali, K. Suresh, R. Kanaka Raju

26. An Efficient Data Encryption Through Image via Prime Order Symmetric Key and Bit Shuffle Technique
R. V. S. S. Lalitha, P. Naga Srinivasu

27. Peak Detection and Correlation Analysis in Noisy Time Series Data
L. Trinadh, R. Venkat Shesu, M. Kranthi Kiran, Satya V. Jampana

28. Novel Hash Based Key Generation for Stream Cipher in Cloud
K. DeviPriya, L. Sumalatha

29. PSNM: An Algorithm for Detecting Duplicates in Oceanographic Data
L. Srinivasa Reddy, S. P. Vighneshwar, B. Ravikiran

30. Detecting and Correcting the Degradations of Sensors on Argo Floats Using Artificial Neural Networks
T Satyanarayana Raju, T. V. S. Udaya Bhaskar, J. Pavan Kumar, K. S. Deepthi

31. Bit Resultant Matrix for Mining Quantitative Association Rules of Bipolar Item Sets
Dileep Kumar Koda, P. Vinod Babu

32. Application of Ant Colony Optimization Techniques to Predict Software Cost Estimation
V. Venkataiah, Ramakanta Mohanty, J. S. Pahariya, M Nagaratna

33. Cloud-Based e-Healthcare Service System Design for On-Demand Affordable Remote Patient Care
Parvathy Dharmarajan, B Rajathilagam

34. A Streamlined Approach of Cloud Certificate Less Authentication Scheme Using ASCII Code Data Encryption Technique
AyodhyaRam Mohanthy, Jagadish Gurrala

35. Improved Identity Based Digital Signature Authentication Using Feistel Algorithm in Cloud Computing
Juluru Aruna, D. Ashwani

36. Securing BIG DATA: A Comparative Study Across RSA, AES, DES, EC and ECDH
I. Bhargavi, D. Veeraiah, T. Maruthi Padmaja

37. Signal Condition and Acquisition System for a Low Cost EMG Based Prosthetic Hand
B. Koushik, J. Roopa, M. Govinda Raju, Biswajith Roy, H. Manohar, K. S. Geetha, B. S. Satyanarayana

38. Wireless Monitoring of NH3 (Ammonia) Using WO3 Thin Film Sensor
J. Roopa, S. G. Divakara, S. Lakshmi Prasad, A. M. Lakshmikanth, Rajath. B. Das, K. S. Geetha, B. S. Satyanarayana

39. Big Data Layers and Analytics: A Survey
G. Manikandan, S. Abirami

40. A More Efficient and Secure Untraceable Remote User Password Authentication Scheme Using Smart Card with Session Key Agreement
Ajay Kumar Sahu, Ashish Kumar

41. Avoiding Slow Running Nodes in Distributed Systems
Shyam Deshmukh, Jagannath Aghav, K. Thirupathi Rao, B. Thirumala Rao

42. Region Based Semantic Image Retrieval Using Ontology
Morarjee Kolla, T. Venu Gopal

43. Validation of Lehman Laws of Growth and Familiarity for Open Source Java Databases
Arvinder Kaur, Vidhi Vig

44. Genetic Algorithm and Particle Swarm Optimization: Analysis and Remedial Suggestions
Hari Mohan Pandey

45. A Dual Phase Probabilistic Model for Dermatology Classification
Shweta, Sangeeta Rani

46. Performance Evaluation of Reproduction Operators in Genetic Algorithm
Hari Mohan Pandey, Nidhi Jain

47. Rolling Circle Algorithm for Routing Along the Boundaries of Wireless Sensor Networks
Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan

48. Improving Shared Cache Performance Using Variation of Bit Set Insertion Policy
Dilbag Singh, Dupinder Kaur

49. Phrase Based Web Document Clustering: An Indexing Approach
Amit Prakash Singh, Shalini Srivastava, Sanjib Kumar Sahu

50. Effectiveness of FPA in Sparse Data Modelling and Optimization
R. S. Umamaheswara Raju, V. Ramachandra Raju, R. Ramesh

51. Voice Recognition Based on Vector Quantization Using LBG
D. Nagajyothi, P. Siddaiah

52. Improved In-System Debugging of High Level Synthesis Generated FPGA Circuits
A. Murali, K. Hari Kishore, A. Trinadha, Saswat Tripathy, P. Dhanunjaya Rao

53. Design of Cascaded Hybrid Interleaver for Fast Turbo Coding and Decoding
M. Rajani Devi, K. Ramanjaneyulu, B. T. Krishna

54. Multi User Authentication in Reliable Data Storage in Cloud
Sk. Yakoob, V. Krishna Reddy, C. Dastagiraiah

55. Bio-Inspired Approach for Energy Aware Cluster Head Selection in Wireless Sensor Networks
D. Rajendra Prasad, P. V. Naganjaneyulu, K. Satya Prasad

56. Performance of Slotted Hexagonal Patch for Wireless Applications
K. Madhu Sudhana Rao, M. V. S. Prasad

57. On the Notch Band Characteristics of Ring Antenna
Anjaneyulu Katuru, Sudhakar Alapati

58. Design of a Compact Wideband Bow-Tie Dielectric Stacked Patch Antenna for Ku-Band Spectrum
Venkateswara Rao Tumati, Rajesh Kolli, Anilkumar Tirunagari

59. Design of Scan Cell for System on Chip Scan Based Debugging Applications
A. Murali, K. Hari Kishore, G. Vijaya Padma, L. Srikanth, R. H. Gopalkrishna

60. Performance of Optimized Reversible Vedic Multipliers
A. Sai Ramya, B. S. S. V. Ramesh Babu, E. Srikala, M. Pavan, P. Unita, A. V. S. Swathi

61. A Novel Congestion Control Scheme in VANET
Arun Malik, Babita Pandey, Anjuman Gul

62. An Enhanced Spray-Copy-Wait DTN Routing Using Optimized Delivery Predictability
Harveen Kaur, Harleen Kaur

63. Impact of Facebook’s Check-in Feature on Users of Social Networking Sites
Hitesh Kumar, Shilpi Sharma, Tanupriya Choudhury, Praveen Kumar

Keywords: Engineering, Communications Engineering, Networks, Systems and Data Security, Computational Intelligence

Editor
 
 
 
Publisher
Springer
Publication year
2017
Language
en
Edition
1
Series
Lecture Notes in Networks and Systems
Page amount
31 pages
Category
Technology, Energy, Traffic
Format
Ebook
eISBN (PDF)
9789811032264
Printed ISBN
978-981-10-3225-7

Similar titles