Computer communication, networking and internet security : proceedings of IC3T 2016
The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. I...
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , , , |
Format: | eBook |
Language: | English |
Published: |
Singapore :
Springer,
2017.
|
Series: | Lecture notes in networks and systems ;
v. 5. |
Subjects: | |
ISBN: | 9789811032264 9789811032257 |
Physical Description: | 1 online resource (xxxi, 623 pages) : illustrations |
LEADER | 06264cam a2200541Ii 4500 | ||
---|---|---|---|
001 | 100065 | ||
003 | CZ-ZlUTB | ||
005 | 20240914112511.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 170505s2017 si a o 101 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d GW5XE |d EBLCP |d N$T |d YDX |d OCLCF |d UAB |d ESU |d AZU |d UPM |d IOG |d COO |d MERER |d OCLCQ |d U3W |d OCLCQ |d CAUOI |d KSU |d VT2 |d WYU |d OCLCO |d AUD |d UKMGB |d UKAHL |d OCLCQ |d ERF |d UKBTH |d OCLCQ | ||
020 | |a 9789811032264 |q (electronic bk.) | ||
020 | |z 9789811032257 |q (print) | ||
024 | 7 | |a 10.1007/978-981-10-3226-4 |2 doi | |
035 | |a (OCoLC)985702621 |z (OCoLC)986545450 |z (OCoLC)986883003 |z (OCoLC)992469416 |z (OCoLC)992826512 |z (OCoLC)999413495 |z (OCoLC)1005809702 |z (OCoLC)1011908645 |z (OCoLC)1048100379 |z (OCoLC)1066606556 |z (OCoLC)1086541832 |z (OCoLC)1112565951 |z (OCoLC)1112890323 |z (OCoLC)1113124927 | ||
111 | 2 | |a International Conference on Computer and Communication Technologies |n (3rd : |d 2016 : |c Vijayawada, India) | |
245 | 1 | 0 | |a Computer communication, networking and internet security : |b proceedings of IC3T 2016 / |c Suresh Chandra Satapathy, Vikrant Bhateja, K. Sruhan Raju, B. Janakiramaiah, editors. |
246 | 3 | |a IC3T 2016 | |
264 | 1 | |a Singapore : |b Springer, |c 2017. | |
300 | |a 1 online resource (xxxi, 623 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in networks and systems, |x 2367-3370 ; |v volume 5 | |
500 | |a Includes author index. | ||
505 | 0 | |a Preface; Organising Committee; Patrons; Organising Committee; Local Organising Committee; Contents; Editors and Contributors; 1 Approach Towards Increasing Efficiency of Communication Protocol in Wireless Sensor Network Using Modified Routing Protocol; Abstract; 1 Introduction; 2 Related Work; 3 Neural LEACH and M-Gear; 4 M-Gear; 5 Test Results and Comparison; 6 Conclusion; References; 2 Anomaly Detection System in a Cluster Based MANET; Abstract; 1 Introduction; 2 Related Work; 3 AODV (Adhoc On-Demand Distance Vector); 4 The Proposed Method; 5 Experimental Results; 5.1 Simulation Scenario. | |
505 | 8 | |a 5.2 Summary of Results6 Conclusions; References; 3 Temperature Data Transfer Using Visible Light Communication; Abstract; 1 Introduction; 2 Related Works; 3 Proposed Temperature Data Transfer Using VLC System; 3.1 Temperature Sensing and VLC Transmitting Procedure; 3.2 LOS Channel Model; 3.3 VLC Receiving Procedure; 4 Experimental Testing and Results Discussion; 4.1 Room Temperature Data Transmission Using VLC; 4.1.1 First Test; 4.1.2 Second Test; 4.1.3 Third Test; 4.2 Body Temperature Monitoring and Data Transmission Using VLC; 5 Conclusion and Future Work; References. | |
505 | 8 | |a 4 A New Approach for Data Security in Cryptography and SteganographyAbstract; 1 Introduction; 2 Proposed Method; 2.1 Encoding Message; 2.2 Hiding the Encoded Message into an Image; 3 Results and Discussion; 3.1 At Sender Side; 3.2 At Receiver Side; 3.3 Avalanche Effect; 4 Conclusion; References; 5 Improvement of Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network; Abstract; 1 Introduction; 2 Related Work; 3 Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network; 4 Proposed Protocol; 5 Simulation and Analysis. | |
505 | 8 | |a 6 Conclusion and Future ScopeReferences; 6 Computational and Emotional Linguistic Distance and Language Learning; Abstract; 1 Introduction; 2 Linguistic Distance; 3 Computational Linguistics; 3.1 Approaches to Computational Linguistics; 3.2 Speech Recognition Systems; 4 Computational Linguistic Distance; References; 7 Collaborative Attack Effect Against Table-Driven Routing Protocols for WANETs: A Performance Analysis; Abstract; 1 Introduction; 2 Related Work; 3 Overview of Routing Protocols; 3.1 Proactive Routing Protocols; 3.1.1 Destination-Sequenced Distance-Vector (DSDV) Routing Protocol. | |
505 | 8 | |a 3.1.2 Optimized Link State Routing (OLSR) Routing Protocol3.2 Performance Assessment of Proactive Routing Protocols; 3.2.1 Assessment of DSDV and OLSR Routing Protocol; 4 Modelling Collaborative Attack Against Adhoc Routing Protocols; 5 Simulation Results and Performance Analysis; 6 Conclusion and Future Work; References; 8 Body Biased High Speed Full Adder to LNCS/LNAI/LNBI Proceedings; Abstract; 1 Introduction; 2 Literature Survey; 2.1 CCMOS 28 Transistor Full Adder; 2.2 GDI Full Adder; 2.3 MG-GDI Full Adder; 2.4 Low Power High Speed Hybrid Full Adder; 2.5 High Speed GLBB Technique. | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource. | ||
590 | |a SpringerLink |b Springer Complete eBooks | ||
650 | 0 | |a Computer networks |v Congresses. | |
650 | 0 | |a Telecommunication systems |v Congresses. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Satapathy, Suresh Chandra, |d 1964- |e editor. | |
700 | 1 | |a Bhateja, Vikrant, |e editor. | |
700 | 1 | |a Raju, K. Srujan, |e editor. | |
700 | 1 | |a Janakiramaiah, B., |e editor. | |
776 | 0 | 8 | |i Print version: |a International Conference on Computer and Communication Technologies (3rd : 2016 : Vijayawada, India). |t Computer communication, networking and internet security. |d Singapore : Springer, 2017 |z 9811032254 |z 9789811032257 |w (OCoLC)961415283 |
830 | 0 | |a Lecture notes in networks and systems ; |v v. 5. | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-981-10-3226-4 |y Plný text |
992 | |c NTK-SpringerENG | ||
999 | |c 100065 |d 100065 | ||
993 | |x NEPOSILAT |y EIZ |