Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing (eBook)

Vinu V. Das (Herausgeber)

eBook Download: PDF
2012 | 2013
XIV, 670 Seiten
Springer New York (Verlag)
978-1-4614-3363-7 (ISBN)

Lese- und Medienproben

Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing -
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Third International Conference on Recent Trends in Information, Telecommunication and Computing - ITC 2012. ITC 2012 will be held during Aug 03-04, 2012, Kochi, India. ITC 2012, is to bring together innovative academics and industrial experts in the field of Computer Science, Information Technology, Computational Engineering, and Communication to a common forum. The primary goal of the conference is to promote research and developmental activities in Computer Science, Information Technology, Computational Engineering, and Communication. Another goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners.

Dr. Vinu V Das, an authority in Network Security and Wireless Network is heading the Network Security Group (NSG), Science Park, Amsterdam and an Editor in Chief of the International Journal of Network Security. He is also the Chief Executive of the Association of Computer Electronics and Electrical Engineers (ACEEE) and the Institute of Doctors Engineers and Scientists - IDES. So far he has authored three books, and edited many in field of Computer Science.


Third International Conference on Recent Trends in Information, Telecommunication and Computing - ITC 2012. ITC 2012 will be held during Aug 03-04, 2012, Kochi, India. ITC 2012, is to bring together innovative academics and industrial experts in the field of Computer Science, Information Technology, Computational Engineering, and Communication to a common forum. The primary goal of the conference is to promote research and developmental activities in Computer Science, Information Technology, Computational Engineering, and Communication. Another goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners.

Dr. Vinu V Das, an authority in Network Security and Wireless Network is heading the Network Security Group (NSG), Science Park, Amsterdam and an Editor in Chief of the International Journal of Network Security. He is also the Chief Executive of the Association of Computer Electronics and Electrical Engineers (ACEEE) and the Institute of Doctors Engineers and Scientists - IDES. So far he has authored three books, and edited many in field of Computer Science.

Full Papers.- High Through-put VLSI Architecture for FFT Computation.- Formal Approach to Reliability Improvement with Model Checker.- DDoS attacks Defense System using Information Metrics.- CEAR: Cluster based Energy Aware RoutingAlgorithm to Maximize Lifetime of Wireless Sensor Networks (WSNs).- TGAR: Trust Dependent Greedy Anti-void Routing in Wireless Sensor Networks (WSNs).- DoS Attack-resistant Framework for Client/Server Intelligent Computing.- Effect of Forwarding Strategy on the Life Time of Multi-hop Multi-sink Sensor Networks.- Concept Similarity and Cosine Similarity Result Merging Approaches in Metasearch Engine.- Aspect Dependency Analyzer Framework for Aspect Oriented Requirements.- Hybrid Extremal Optimization and Glowworm Swarm Optimization.- Implementation of New Technic for the Capacity Improvement in Wavelength Division Multiplexing Networks.- A Comparative Review of Contention-Aware Scheduling Algorithms to Avoid Contention in Multicore Systems.- Developing Embedded Systems from Formal Specifications written in Temporal Logic.- Network log Clustering Using K-means Algorithm.- Improvement Public Key Kerberos using Identity-Based Signcryption.- Intrusion Detection Using Keystroke Dynamics.- MRI-PET Medical Image Fusion Technique by Combining Contourlet and Wavelet Transform.- Comparison of Routing Protocols in Mobile Ad-hoc Network.- Analysis of Image Segmentation Algorithms Using MATLAB.- Tumor Mass Identification Based on Surface Analysis and Fractal Dimensions.- Mean-Shift Algorithm: Verilog HDL Approach.- Optimal Node Selection using Estimated Data Accuracy Model in Wireless Sensor Networks.- A Security Framework for DDoS Detection In MANETs.- Improvement of system stability margins using coordination control of Static Var Compensator (SVC) and Thyristor Controlled Series Capacitor (TCSC).- Effect of Parasitics of Feed-Forward Compensated OTA on Active-RC Integrators.- Modeling of Photovoltaic Charging System for the Battery Powered Wireless Sensor Networks.- Torque Computation of Induction Motor with VVVF Drive Subjected to Severe Torque Fluctuation.- Performance Analysis of Different Current Controllers for Active Power Filter.- Optimum LQR Switching Approach for the Improvement of STATCOM Performance.- Squirrel Cage Rotor Design for Safety and Reliability Improvement of a Three Phase Induction Machine.- Experimental Validation and Performance Comparison of Multi-Loop MPPT Controlled PV Systems on Low to High End Controllers.- Effect of Temperature on Si-Ge Hetero-Gate Raised Buried Oxide Drain Tunnel FET Electrical Parameters.- A Novel Inverter Topology for Low Power Drives.- Enhancement of ATC In presence of SSSC Using Linear and Reactive Methods.- Improvement of Power Quality and PerformanceAnalysis of PV Fed UPQC in Utility Connected System.- Design of Adaptive FLANN based model for Non-linear Channel Equalization.- Short Papers.- Optimal and Robust Framework for Enhancing Network Lifetime using Power Efficient AODV in Mobile Adhoc Network.- Voice Transformation using Radial Basis Function.- IPTC based Ontological Representation of Educational News RSS Feeds.- Design of Optimized Modular Multiplier using Montgomery Algorithm for RSA Cryptosystem.- Automatic Generation of P2P botnet Network Attack Graph.- Parallelization of Fractal Image Compression over CUDA.- Distributed Shared Files Management.- Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization.- Parallel Pseudo-Exhaustive and Low Power delay testing of VLSI systems.- An Algorithm for Traffic Analysis using RFID Technology.- Trust-Based Grid Resource Management.- Switch Line Fault Diagnosis in FPGA Interconnects Using Line Tracing Approach.- An Approach to Encryption using Superior Fractal Sets.- Shape Based Image Retrieval using Gradient Operators and Block Truncation Coding.- Performance Evaluation of TCP Congestion Control Variants Using Dynamic State Routing In Wireless Ad-HOC Network.- Security based Requirements Engineering for E-Voting System.- Analysis of 3 Dimensional Object Watermarking Techniques.- Graph Based Approach for Heart Disease Prediction.- Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks.- An Efficient Algorithm for Finding Frequent Sequential Traversal Patterns from Web Logs based on Dynamic Weight Constraint.- A Blind Watermarking Algorithm for Audio Signals Based on Singular Value Decomposition.- Performance Evaluation of Web Browsers in Android.- FPGA Triggered Space Vector Modulated Voltage Source Inverter Using MATLAB/System Generator®.- Face Recognition Using PCA and Bit-Plane Slicing.- Operational Analysis, Performance Evaluation and Simulation of Solar Cell Powered Embedded EZ-source Inverter fed Induction Motor.- Advanced DSP based PLC Modem over DC Lines for Real-time Remote Monitoring of PV Plant Parameters.- Digital security with Thermal Dorsal Hand Vein patterns Using Morphological Techniques.- Design of a Two Phase Inverter for a Specific Two Phase Induction Motor through MATLAB Simulation.- Artificial Neural Network based Power System Stability Analysis.- Poster Paper.- Efficient Bandwidth Utilization in Client-Server Models.- Vlsi Approach for Four Quadrant Analog Multiplier for 2.4 Ghz to 2.5 Ghz .- Intelligent Enterprise Application Servers – A Vision for self-managing performance.- A review of disc Scrubbing and Intra Disk Redundancy for reducing data loss in Disk FileSystems.- Homogeneous & Heterogeneous Energy Schemes for Hierarchical Cluster Based Routing Protocols in WSN: A Survey.- Itinerary Management System.- Trust and Reliability based Scheduling Algorithm for Cloud IaaS.- Hybrid Covert Channel an Obliterate for Information Hiding.- Steganography and Its Technique: Technical Overview.- Data Stream Mining: A Review.- Comparison of Various Harmonic Mitigation Techniques in Induction Furnaces.- Real Time Remote Monitoring and Measurement of Loss due to Dry Flue Gas for an Industrial Boiler.- Characterization of Electrical and Thermal Properties of Enamel Filled with Carbon Nanotubes.- Tuned Fuzzy Logic Control of Switched Reluctance Motor Drives.

Erscheint lt. Verlag 14.9.2012
Reihe/Serie Lecture Notes in Electrical Engineering
Zusatzinfo XIV, 670 p.
Verlagsort New York
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Mathematik / Informatik Informatik Theorie / Studium
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Cellular arrays and automata • Control design • Data Communications Devices • Data-path design • Hardware Description Languages • Memory Design • Performance Analysis and Design Aids • Register-Transfer-Level Implementation • Web technologies • Wireless systems
ISBN-10 1-4614-3363-0 / 1461433630
ISBN-13 978-1-4614-3363-7 / 9781461433637
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 17,1 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Martin Linten; Axel Schemberg; Kai Surendorf

eBook Download (2023)
Rheinwerk Computing (Verlag)
29,90
Das umfassende Handbuch

von Michael Kofler; Charly Kühnast; Christoph Scherbeck

eBook Download (2024)
Rheinwerk Computing (Verlag)
33,68
Grundlagen der IPv4- und IPv6-Kommunikation

von Anatol Badach; Erwin Hoffmann

eBook Download (2022)
Carl Hanser Verlag GmbH & Co. KG
69,99