Computing and network sustainability : proceedings of IRSCNS 2016
The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sus...
Saved in:
| Corporate Author | |
|---|---|
| Other Authors | , |
| Format | Electronic eBook |
| Language | English |
| Published |
Singapore :
Springer,
©2017.
|
| Series | Lecture notes in networks and systems ;
v. 12. |
| Subjects | |
| Online Access | Full text |
| ISBN | 9789811039355 9789811039362 9789811350030 9789811039348 |
| ISSN | 2367-3370 ; |
| Physical Description | 1 online resource (xxii, 434 pages) : illustrations (some color) |
Cover
Table of Contents:
- Preface; Conference Organizing Committee; Advisory Committee; Organizing Committee; Program Committee; Contents; Editors and Contributors; 1 Trust Model for Secure Routing and Localizing Malicious Attackers in WSN; Abstract; 1 Introduction; 1.1 Conceptual Diagram; 2 Paper Organization; 3 Objective; 4 Scope of the Work; 5 Proposed Work; 6 Result and Analysis; 7 Conclusion; References; 2 Probabilistic Analysis of Performance Measures of Redundant Systems Under Weibull Failure and Repair Laws; Abstract; 1 Introduction; 2 System Model Description, Notations and States of the Model; 3 Notations.
- 4 Various Transition States of the System Models5 Transition Probabilities; 6 Mean Sojourn Times; 7 Reliability Measures; 7.1 Mean Time to System Failure; 7.2 Availability Analysis; 7.3 Some Other Reliability Characteristics; 8 Profit Analysis; 8.1 Comparative Study; 9 Graphical Results; References; 3 Blockage With in Wi-Fi Sensor Networks in Addition to Systems Regarding Controlling Congestion; Abstract; 1 Introduction; 2 Bottlenecks in Wireless Sensor Networks; 3 Types of Blockages in Wireless Systems; 4 Review of Congestion Control Protocols in Wireless Sensor Networks.
- 4.1 Clog Avoidance and Detection4.2 Fairness Aware Congestion Control; 4.3 Versatile Rate Control; 4.4 SenTCP; 4.5 Reasonable Awareness Congestion Control; 4.6 Priority-Based Congestion Control Protocol (PCCP); 4.7 Stream; 4.8 Siphon; 4.9 Prioritized Heterogeneous Traffic-Oriented Congestion Control Protocol (PHTCCP); 4.10 Learning Automata-Based Congestion Avoidance Algorithm in Sensor Networks (LACAS); 5 Conclusion; References; 4 Privacy Preserving Using Video Encryption Technique-the Hybrid Approach; Abstract; 1 Introduction; 2 Cryptography Information.
- 3 Video Encryption Algorithm Approach4 Proposed Methodology for Video Encryption; 5 Pros and Cons of Proposed Methodology; 6 Simulation Study; 7 Conclusion; References; 5 Performance Analysis of Improved AODV Routing Protocol in Mobile Ad hoc Network; Abstract; 1 Introduction; 2 Proposed Idea Description; 3 Simulation Model; 4 Conclusion; References; 6 Slots Loaded Multilayered Circular Patch Antenna for Wi-Fi/WLAN Applications; Abstract; 1 Introduction; 2 Antenna Design; 3 Result and Discussion; 4 Conclusions; References.
- 7 Triggering a Functional Electrical Stimulator Based on Gesture for Stroke-Induced Movement DisorderAbstract; 1 Introduction; 2 Experimental Setup; 2.1 Electromyography; 2.2 Attitude Estimate; 2.3 Trigger Mechanism; 3 Results; 4 Conclusion; References; 8 Academic Dashboard-Prediction of Institutional Student Dropout Numbers Using a Naïve Bayesian Algorithm; Abstract; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Survey Form During Student Admission; 3.2 Survey Form for the Middle of Term; 3.3 Work Methodology; 3.4 Predictions of Dropping Out; 4 Research Ethics; 5 Experimental Results.