ISBN-13: 9788132225287 / Angielski / Twarda / 2015 / 653 str.
ISBN-13: 9788132225287 / Angielski / Twarda / 2015 / 653 str.
Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing amidst many others. This two volume proceedings explore the combined use of Advanced Computing and Informatics in the next generation wireless networks and security, signal and image processing, ontology and human-computer interfaces (HCI). The two volumes together include 132 scholarly articles, which have been accepted for presentation from over 550 submissions in the Third International Conference on Advanced Computing, Networking and Informatics, 2015, held in Bhubaneswar, India during June 23-25, 2015.
Section A_Distributed Systems, Social Networks, and Applications : Chapter 1. An Algorithm for Partitioning Community Graph into Sub-Community Graphs Using Graph Mining Techniques.- Chapter 2. Traceback: A Forensic Tool for Distributed Systems.- Chapter 3. Deterministic Transport Protocol Verified by a Real-time Actuator and Sensor Network Simulation for Distributed Active Turbulent Flow Control.- Chapter 4. Improved Resource Provisioning in Hadoop.- Chapter 5. Cuckoo Search for Influence Maximization in Social networks.- Chapter 6. An Interactive System for Event Detection and Trend Analysis for Twitter Data.- Chapter 7. Design and Implementation of a Hierarchical Content Delivery Network Interconnection Model.- Section B_Networking systems and Architectures: Chapter 8. Solving Reliability Problems in Complex Networks with Approximated Cuts and Paths.- Chapter 9. Maximal Clique Size vs. Centrality: A Correlation Analysis for Complex Real World Network Graphs.- Chapter 10. On Solving the Multi-depot Vehicle Routing Problem.- Chapter 11. Prediction of Crop & Intrusions Using WSN.- Chapter 12. Ethernet MAC Verification by Efficient Verification Methodology for SOC Performance Improvement.- Chapter 13. MCDRR Packet Scheduling Algorithm for Multi-channel Wireless Networks.- Chapter 14. A Random Access Registration and Scheduling Based MAC Protocol with Directional Antennas for Improving Energy Efficiency.- Chapter 15. A Key Agreement Algorithm Based on ECDSA for Wireless Sensor Network.- Chapter 16. Frame Converter for Cooperative Coexistence between IEEE 802.15.4 Wireless Sensor Networks and WiFi.- Section C_Research on Wireless Sensor Networks, VANETs, and MANETs: Chapter 17. Secured Time Stable Geocast (S-TSG) Routing for VANETs.- Chapter 18. Reduction in Resource Consumption to Enhance Cooperation in MANET Using Compressive Sensing.- Chapter 19. AODV and ZRP Protocols Performance Study Using OPNET Simulator and EXata Emulator.- Chapter 20. Optimal Probabilistic Cluster Head Selection for Energy Efficiency in WSN.- Chapter 21. Firefly Algorithm Approach for Localization in Wireless Sensor Networks.- Chapter 22. Performance Analysis of Location and Distance Based Routing Protocols in VANET with IEEE802.- Chapter 23. Fuzzy based Analysis of Energy Efficient Protocols in Heterogeneous Wireless Sensor Networks.- Chapter 24. Node Application and Time based Fairness in Ad-hoc Networks: An Integrated Approach.- Chapter 25. Bee Colony Optimization for Data Aggregation in Wireless Sensor Networks.- Section D_Cryptography and Security Analysis: Chapter 26. Extended Visual Cryptography Scheme for Multi-Secret Sharing.- Chapter 27. Identifying HTTP DDoS Attacks Using Self Organizing Map and Fuzzy Logic in Internet based Environments.- Chapter 28. Improving the Visual Quality of (2,n) Random Grid Based Visual Secret Sharing Schemes.- Chapter 29. An Efficient Lossless Modulus Function Based Data Hiding Method.- Chapter 30. On the Use of Gaussian Integers in Public Key Cryptosystems.- Chapter 31. Stack Overflow based Defense for IPv6 Router Advertisement Flooding (DoS) Attack.- Chapter 32. Ideal Contrast Visual Cryptography for General Access Structures with AND Operation.- Chapter 33. Extending Attack Graph-based Metrics for Enterprise Network Security Management.- Chapter 34. A Graph-based Chameleon Signature Scheme.- Chapter 35. Design of ECSEPP: Elliptic Curve Based Secure E-Cash Payment Protocol.- Chapter 36. Security Improvement of One-Time Password Using Crypto-Biometric Model.- Chapter 37. An Image Encryption Technique Using Orthonormal Matrices and Chaotic Maps.- Chapter 38. Learning Probe Attack Patterns with Honeypots.- Section E_Operating System and Software Analysis: Chapter 39. Fuzzy Based Multilevel Feedback Queue Scheduler.- Chapter 40. Dynamic Slicing of Feature-Oriented Programs.- Chapter 41. Mathematical Model to Predict IO Performance Based on Drive Workload Parameters.- Chapter 42. Measure of Complexity for Object-Oriented Programs: A Cognitive Approach.- Chapter 43. Measurement of Semantic Similarity: A Concept Hierarchy Based Approach.- Chapter 44. Evaluating the Effectiveness of Conventional Fixes for SQL Injection Vulnerability.- Chapter 45. Salt and Pepper Noise Reduction Scheme Using Cellular Automata.- Section F_Internet, Web Technology, and Web Security: Chapter 46. Optimizing the Performance in Web Browsers through Data Compression: A study.- Chapter 47. Architectural Characterization of Web Service Interaction Verification.- Chapter 48. Revamping Optimal Cloud Storage System.- Chapter 49. Performance Improvement of MapReduce Framework by Identifying Slow TaskTrackers in Heterogeneous Hadoop Cluster.- Chapter 50. Router Framework for Secured Network Virtualization in Data Center of IaaS Cloud.- Chapter 51. Analysis of Machine Learning Techniques Based Intrusion Detection Systems.- Chapter 52. Compression and Optimization of Web-Contents.- Chapter 53. Harnessing Twitter for Automatic Sentiment Identification Using Machine Learning Techniques.- Section G_Big Data and Recommendation Systems: Chapter 54. Analysis and Synthesis for Archaeological Database Development in Nakhon Si Thammarat.- Chapter 55. Evaluation of Data Mining Strategies Using Fuzzy Clustering in Dynamic Environment.- Chapter 56. A Survey of Different Technologies and Recent Challenges of Big Data.- Chapter 57. Privacy Preserving Association Rule Mining in Horizontally Partitioned Databases without involving Trusted Third Party (TTP).- Chapter 58. Performance Efficiency and Effectiveness of Clustering Methods for Microarray Datasets.- Chapter 59. Data Anonymization through Slicing based on Graph-based Vertical Partitioning.- Chapter 60. An Efficient Approach for the Prediction of G-protein Coupled Receptors and their Subfamilies.- Section H_Fault and Delay Tolerant Systems: Chapter 61. Max-Util: A Utility-based Routing Algorithm For a Vehicular Delay Tolerant Network Using Historical Information.- Chapter 62. A Novel Approach for Real-Time Data Management in Wireless Sensor Network.- Chapter 63. Contact Frequency and Contact Duration Based Relay Selection Approach inside the Local Community in Social Delay Tolerant Network.- Section I_Satellite Communication, Antenna Research, and Cognitive Radio: Chapter 64. Optimal Structure Determination of Microstrip Patch Antenna for Satellite Communication.- Chapter 65. Multi-Metric Routing Protocol for Multi-Radio Wireless Mesh Networks.- Chapter 66. A Novel Dual Band Antenna for RADAR Application.
Prof. Atulya Nagar holds the Foundation Chair as Professor of Mathematical Sciences at Liverpool Hope University where he is the Dean of Faculty of Science. He has been the Head of Department of Mathematics and Computer Science since December 2007. A mathematician by training he is an internationally recognised scholar working at the cutting edge of applied non-linear mathematical analysis, theoretical computer science, operations research and systems engineering and his work is underpinned by strong complexity-theoretic foundations. He has an extensive background and experience of working in Universities in the UK and India. He has edited volumes on Intelligent Systems, and Applied Mathematics; he is the Editor-in-Chief of the International Journal of Artificial Intelligence and Soft Computing (IJAISC) and serve on editorial boards for a number of prestigious journals such as the Journal of Universal Computer Science (JUCS). Prof Nagar received a prestigious Commonwealth Fellowship for pursuing his Doctorate (DPhil) in Applied Non-Linear Mathematics, which he earned from the University of York in 1996. He hold BSc (Hons.), MSc, and MPhil (with Distinction) from the MDS University of Ajmer, India.
Dr. Durga Prasad Mohapatra received his PhD from Indian Institute of Technology Kharagpur. He joined the Department of Computer Science and Engineering at the National Institute of Technology, Rourkela, India in 1996, where he is presently serving as Associate Professor. His research interests include software engineering, real-time systems, discrete mathematics, and distributed computing. He has published more than thirty research papers in these fields in various international Journals and Conferences. He has received several project grants from DST and UGC, Govt. of India. He has received the Young Scientist Award for the year 2006 by Orissa Bigyan Academy. He has also received the Prof. K. Arumugam National Award and the Maharashtra State National Award for outstanding research work in Software Engineering for the years 2009 and 2010, respectively, from the Indian Society for Technical Education (ISTE), New Delhi. He is going to receive the Bharat Sikshya Ratan Award for significant contribution in academics awarded by the Global Society for Health and Educational Growth, Delhi.
Prof. Nabendu Chaki is a Professor in the Department Computer Science & Engineering, University of Calcutta, Kolkata, India. Dr. Chaki did his first graduation in Physics the legendary Presidency College in Kolkata and then in Computer Science & Engineering, University of Calcutta. He has completed Ph.D. in 2000 from Jadavpur University, India. He is sharing two US patents and one patent in Japan with his students. Prof. Chaki is quite active in developing international standards for Software Engineering. He represents the country in the Global Directory (GD) for ISO-IEC. Besides editing more than 20 books in different Springer series including LNCS, Dr. Chaki has authored 5 text and research books and about 130 peer-reviewed research papers in Journals and International conferences. His areas of research interests include distributed computing, image processing and software engineering. Dr. Chaki has served as a Research Assistant Professor in the Ph.D. program in Software Engineering in U.S. Naval Postgraduate School, Monterey, CA. He is having strong and active collaborations in US, Europe, Australia and other institutes and industries in India. He is a visiting faculty member for many Universities in India and abroad. Dr. Chaki has been the Knowledge Area Editor in Mathematical Foundation for the SWEBOK project of the IEEE Computer Society. Besides being in the editorial board for several International Journals, he has also served in the committees of more than 50 international conferences. Prof. Chaki is the founder Chair of ACM Professional Chapter in Kolkata.
Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing amidst many others. This two volume proceedings explore the combined use of Advanced Computing and Informatics in the next generation wireless networks and security, signal and image processing, ontology and human-computer interfaces (HCI). The two volumes together include 132 scholarly articles, which have been accepted for presentation from over 550 submissions in the Third International Conference on Advanced Computing, Networking and Informatics, 2015, held in Bhubaneswar, India during June 23–25, 2015.
1997-2024 DolnySlask.com Agencja Internetowa