Computer Communication, Networking and Internet Security -

Computer Communication, Networking and Internet Security (eBook)

Proceedings of IC3T 2016
eBook Download: PDF
2017 | 1st ed. 2017
XXXI, 623 Seiten
Springer Singapore (Verlag)
978-981-10-3226-4 (ISBN)
Systemvoraussetzungen
309,23 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

Dr. Suresh Chandra Satapathy is currently working as a Professor and Head of the Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS), Andhra Pradesh, India. He received his PhD in Computer Science and Engineering from Jawaharlal Nehru Technological University (JNTU), Hyderabad and his Master's degree in Computer Science and Engineering from the National Institute of Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and research experience. His research interests include machine learning, data mining, swarm intelligence studies and their applications to engineering. He has more than 98 publications to his credit in various reputed international journals and conference proceedings. He has edited many volumes from Springer AISC and LNCS in the past. In addition to serving on the editorial board of several international journals, he is a senior member of the IEEE and a Life Member of the Computer Society of India, where he is the National Chairman of Division-V (Education and Research).
 
Dr. K. Srujan Raju is a Professor and Head of the Department of Computer Science and Engineering (CSE), CMR Technical Campus. Professor Srujan earned his PhD in the field of Network Security and his current research interests include computer networks, information security, data mining, image processing, intrusion detection and cognitive radio networks. He has published several papers in referred international conferences and peer-reviewed journals. He was also on the editorial board of CSI 2014 Springer AISC series 337 and 338 volumes. In addition, he served as a reviewer for many indexed journals. Professor Raju has been honored with the Significant Contributor and Active Member Awards by the Computer Society of India (CSI) and is currently the Hon. Secretary of the CSI's Hyderabad Chapter.
 
Prof. Vikrant Bhateja is an Associate Professor at the Department of Electronics and Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head of Academics & Quality Control at the same college. His research interests include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings to his credit. Prof. Vikrant has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the Track Chair and served on the core-technical/editorial teams for numerous international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under the Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under the IEEE. He is an associate editor for the International Journal of Convergence Computing (IJConvC) and also serves on the editorial board of the International Journal of Image Mining (IJIM) under Inderscience Publishers. At present, he is the guest editor for two special issues of the International Journal of Rough Sets and Data Analysis (IJRSDA) and the International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.

Dr. Bonam Janakiramaiah is currently working as a Professor in the Department of Computer Science and Engineering, Devineni Venkata Ramana & Dr. Hima Sekhar MIC College of Technology (DVR & Dr. HS MIC College of Technology), Kanchikacherla, Vijayawada, Andhra Pradesh, India. He received his PhD in Computer Science and Engineering from the Jawaharlal Nehru Technological University (JNTU), Hyderabad and Master's degree in Computer Science and Engineering from the Jawaharlal Nehru Technological University, (JNTU), Kakinada. He has more than 15 years of teaching experience. His research interests include data mining, machine learning, studies and their applications to engineering. He has more than 25 publications to his credit in various reputed international journals and conference proceedings. He is a Life Member of the Computer society of India.

The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

Dr. Suresh Chandra Satapathy is currently working as a Professor and Head of the Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS), Andhra Pradesh, India. He received his PhD in Computer Science and Engineering from Jawaharlal Nehru Technological University (JNTU), Hyderabad and his Master’s degree in Computer Science and Engineering from the National Institute of Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and research experience. His research interests include machine learning, data mining, swarm intelligence studies and their applications to engineering. He has more than 98 publications to his credit in various reputed international journals and conference proceedings. He has edited many volumes from Springer AISC and LNCS in the past. In addition to serving on the editorial board of several international journals, he is a senior member of the IEEE and a Life Member of the Computer Society of India, where he is the National Chairman of Division-V (Education and Research). Dr. K. Srujan Raju is a Professor and Head of the Department of Computer Science and Engineering (CSE), CMR Technical Campus. Professor Srujan earned his PhD in the field of Network Security and his current research interests include computer networks, information security, data mining, image processing, intrusion detection and cognitive radio networks. He has published several papers in referred international conferences and peer-reviewed journals. He was also on the editorial board of CSI 2014 Springer AISC series 337 and 338 volumes. In addition, he served as a reviewer for many indexed journals. Professor Raju has been honored with the Significant Contributor and Active Member Awards by the Computer Society of India (CSI) and is currently the Hon. Secretary of the CSI’s Hyderabad Chapter. Prof. Vikrant Bhateja is an Associate Professor at the Department of Electronics and Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head of Academics & Quality Control at the same college. His research interests include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings to his credit. Prof. Vikrant has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the Track Chair and served on the core-technical/editorial teams for numerous international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under the Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under the IEEE. He is an associate editor for the International Journal of Convergence Computing (IJConvC) and also serves on the editorial board of the International Journal of Image Mining (IJIM) under Inderscience Publishers. At present, he is the guest editor for two special issues of the International Journal of Rough Sets and Data Analysis (IJRSDA) and the International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.Dr. Bonam Janakiramaiah is currently working as a Professor in the Department of Computer Science and Engineering, Devineni Venkata Ramana & Dr. Hima Sekhar MIC College of Technology (DVR & Dr. HS MIC College of Technology), Kanchikacherla, Vijayawada, Andhra Pradesh, India. He received his PhD in Computer Science and Engineering from the Jawaharlal Nehru Technological University (JNTU), Hyderabad and Master’s degree in Computer Science and Engineering from the Jawaharlal Nehru Technological University, (JNTU), Kakinada. He has more than 15 years of teaching experience. His research interests include data mining, machine learning, studies and their applications to engineering. He has more than 25 publications to his credit in various reputed international journals and conference proceedings. He is a Life Member of the Computer society of India.

Preface 6
Organising Committee 8
Patrons 8
Organising Committee 9
Local Organising Committee 9
Contents 16
Editors and Contributors 22
1 Approach Towards Increasing Efficiency of Communication Protocol in Wireless Sensor Network Using Modified Routing Protocol 33
Abstract 33
1 Introduction 33
2 Related Work 35
3 Neural LEACH and M-Gear 35
4 M-Gear 36
5 Test Results and Comparison 38
6 Conclusion 41
References 41
2 Anomaly Detection System in a Cluster Based MANET 42
Abstract 42
1 Introduction 42
2 Related Work 43
3 AODV (Adhoc On-Demand Distance Vector) 43
4 The Proposed Method 44
5 Experimental Results 46
5.1 Simulation Scenario 46
5.2 Summary of Results 50
6 Conclusions 51
References 51
3 Temperature Data Transfer Using Visible Light Communication 53
Abstract 53
1 Introduction 53
2 Related Works 54
3 Proposed Temperature Data Transfer Using VLC System 55
3.1 Temperature Sensing and VLC Transmitting Procedure 55
3.2 LOS Channel Model 56
3.3 VLC Receiving Procedure 56
4 Experimental Testing and Results Discussion 57
4.1 Room Temperature Data Transmission Using VLC 58
4.1.1 First Test 58
4.1.2 Second Test 58
4.1.3 Third Test 60
4.2 Body Temperature Monitoring and Data Transmission Using VLC 61
5 Conclusion and Future Work 62
References 62
4 A New Approach for Data Security in Cryptography and Steganography 64
Abstract 64
1 Introduction 65
2 Proposed Method 65
2.1 Encoding Message 65
2.2 Hiding the Encoded Message into an Image 67
3 Results and Discussion 68
3.1 At Sender Side 68
3.2 At Receiver Side 70
3.3 Avalanche Effect 71
4 Conclusion 72
References 72
5 Improvement of Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network 74
Abstract 74
1 Introduction 74
2 Related Work 75
3 Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network 76
4 Proposed Protocol 77
5 Simulation and Analysis 79
6 Conclusion and Future Scope 87
References 87
6 Computational and Emotional Linguistic Distance and Language Learning 89
Abstract 89
1 Introduction 89
2 Linguistic Distance 90
3 Computational Linguistics 91
3.1 Approaches to Computational Linguistics 92
3.2 Speech Recognition Systems 93
4 Computational Linguistic Distance 94
References 95
7 Collaborative Attack Effect Against Table-Driven Routing Protocols for WANETs: A Performance Analysis 96
Abstract 96
1 Introduction 97
2 Related Work 98
3 Overview of Routing Protocols 98
3.1 Proactive Routing Protocols 99
3.1.1 Destination-Sequenced Distance-Vector (DSDV) Routing Protocol 99
3.1.2 Optimized Link State Routing (OLSR) Routing Protocol 100
3.2 Performance Assessment of Proactive Routing Protocols 101
3.2.1 Assessment of DSDV and OLSR Routing Protocol 101
4 Modelling Collaborative Attack Against Adhoc Routing Protocols 102
5 Simulation Results and Performance Analysis 103
6 Conclusion and Future Work 105
References 106
8 Body Biased High Speed Full Adder to LNCS/LNAI/LNBI Proceedings 108
Abstract 108
1 Introduction 109
2 Literature Survey 109
2.1 CCMOS 28 Transistor Full Adder 110
2.2 GDI Full Adder 110
2.3 MG-GDI Full Adder 110
2.4 Low Power High Speed Hybrid Full Adder 110
2.5 High Speed GLBB Technique 111
3 Proposed System 111
3.1 Modified XNOR Module 111
3.2 Carry Generation Module 112
3.3 Design of the Proposed Full Adder 113
3.4 Elimination of Glitches 113
3.5 Body Biased LPHS Full Adder with 8 Bit Input 114
4 Results and Discussions 115
4.1 Results Analysis 115
4.2 Simulation Results 116
5 Conclusion 117
Acknowledgements 117
References 117
9 Optimization of Contiguous Link Scheduling 119
Abstract 119
1 Introduction 120
2 Related Work 122
3 Proposed Optimized Contiguous Link Scheduling Algorithm 123
3.1 Algorithm 123
4 Results and Analysis 126
5 Conclusion 128
Acknowledgements 128
References 128
10 A Novel Reversible EX-NOR SV Gate and Its Application 130
Abstract 130
1 Introduction 131
2 Preview of Reversible Logic Gates 131
3 Proposed Design 132
3.1 2 × 2 Reversible EXNOR (SV) Gate 132
3.2 2 × 2 Reversible EXNOR (SV) Gate Based Equivalence Checker 133
4 Results and Discussions 134
5 Conclusion 138
References 138
11 Internet of Things and Wireless Physical Layer Security: A Survey 140
Abstract 140
1 Introduction 140
2 Motivation 141
3 IoT Concepts 141
3.1 IoT Elements 141
3.2 IoT Architecture 142
3.3 IoT Communication Standards 143
4 Wireless Network Security 144
4.1 OSI Model for Wireless Systems: Attacks and Security Approach 145
4.2 Wireless Physical Layer Security 145
4.3 IoT and WPLS Methods 146
5 Conclusion 147
Acknowledgements 147
References 148
12 Privacy Preservation in Cloud Computing with Double Encryption Method 149
Abstract 149
1 Introduction 149
2 Related Work 151
3 Problem Formulation 152
4 Proposed Methodologies 152
4.1 Algorithm to Store Data 154
4.2 Algorithm to Access Data 154
5 Results and Discussion 155
5.1 Security Measures for Data Storing 155
5.2 Security Measures for Data Access 156
6 Conclusion and Future Scope 156
References 156
13 A Machine Learning Based Approach for Opinion Mining on Social Network Data 158
Abstract 158
1 Introduction 158
2 Background and Related Work 159
3 Methodology 160
3.1 Data Collection 161
3.2 Preprocessing and Stemming 161
3.3 Feature Vector 163
3.4 Machine Learning Techniques 165
4 Results and Discussion 166
5 Conclusion 169
References 169
14 Congestion Control Mechanism for Real Time Traffic in Mobile Adhoc Networks 171
Abstract 171
1 Introduction 172
2 Related Work 172
3 Analysis of Congestion Control Issues in Real Time Scenario 173
4 The Proposed Approach 174
5 Simulation and Results 175
6 Conclusion and Future Work 176
References 177
15 Correction of Ocular Artifacts from EEG by DWT with an Improved Thresholding 179
Abstract 179
1 Introduction 179
2 Methodology 180
2.1 Data Acquisition 181
2.2 Existing and Proposed Thresholding Method 182
2.3 Performance Evaluation 183
3 Results and Discussions 183
4 Conclusions 188
References 188
16 EGRP: Enhanced Geographical Routing Protocol for Vehicular Adhoc Networks 190
Abstract 190
1 Introduction 190
2 Related Work 191
3 Proposed Work 192
3.1 Determining Distance 193
3.2 Determining the Moving Direction 194
3.3 Predicting the Current Position of the Vehicles 194
4 Performance Evaluation 195
4.1 Simulation Setup 195
4.2 Performance Metrics 196
4.3 Experimental Results 196
5 Conclusion 198
Acknowledgements 198
References 198
17 PAPR Performance Analysis of Unitary Transforms in SLM-OFDM for WLAN 802.11a Mobile Terminals 200
Abstract 200
1 Introduction 200
2 Precoded SLM-OFDM 201
3 Phase Sequence Set 202
4 Unitary Precoding Transform 203
4.1 Discrete Cosine Transforms 203
4.2 COSHAD Transform 204
5 Simulation Results 204
6 Conclusion 207
References 207
18 Optimal Sensing Time Allocation for Energy Efficient Data Transmission in Amplify-Forward Cognitive Relay Assisted Network 209
Abstract 209
1 Introduction 209
2 Description of System Exemplary 210
3 Optimal Sensing Time (OST) Analysis 214
4 Result Analysis 215
5 Conclusion 217
References 217
19 Data Privacy in Online Shopping 218
Abstract 218
1 Introduction 219
1.1 Literature Survey 220
2 Problem Statement 221
3 Proposed Methodology 222
3.1 K Anonymity 222
3.2 L Diversity 223
4 Results 223
4.1 Membership Disclosure Protection 223
4.2 Homogeneity Attack 224
5 Conclusion 225
References 225
20 Design and Performance of Resonant Spacing Linear Patch Array with Quarter Wave Transformer Feed Network for Wireless Applications 227
Abstract 227
1 Introduction 228
2 Design of Feed Network for an Array 228
3 Design Consideration 229
4 Results and Discussion 231
4.1 Results of 1 × 4 RMPA Array 231
5 Conclusion 235
References 235
21 Performance Analysis of PUEA and SSDF Attacks in Cognitive Radio Networks 236
Abstract 236
1 Introduction 236
2 System Model 238
3 Results and Discussions 239
4 Conclusion 241
References 241
22 Design of a 3.4 GHz Wide-Tuning-Range VCO in 0.18 µm CMOS 243
Abstract 243
1 Introduction 243
2 VCO Types 244
2.1 Current-Starved Inverter 244
2.2 Differential Pair with PFET Loads 244
3 Proposed Differential Ring VCO 245
4 Simulation Results 248
5 Conclusion 249
References 249
23 A New Iterative Hybrid Edge Technique Using Image Mosaic 251
Abstract 251
1 Introduction 251
2 Related Work 252
3 Proposed System 253
3.1 Diffe Hellman Key Exchange Protocol 254
3.2 Reverse Binary XOR Algorithm 255
3.3 Least Significant Bit Technique 256
3.4 Edge Based Image Mosaic Technique 256
4 Experimental Results 257
5 Conclusion 259
References 259
24 Time Series Analysis of Oceanographic Data Using Clustering Algorithms 260
Abstract 260
1 Introduction 260
1.1 Related Work 261
2 Proposed Work with Block Diagram 261
2.1 Clustering Algorithms 262
2.1.1 K-Means Algorithm 262
2.1.2 Complexity 263
2.1.3 DBSCAN Algorithm 263
3 Data 264
4 Experimantal Results 264
5 Conclusions 266
5.1 Future Work 266
Acknowledgements 266
References 266
25 Cluster Based Prediction of Keyword Query Over Databases 268
Abstract 268
1 Introduction 268
2 Existing System 269
2.1 Problem Identification 269
3 Proposed System 270
3.1 Preprocessing Document Text 270
3.2 Construction of MVS Matrix 270
3.3 Grouping Related Documents Using K Means Clustering Algorithm 271
3.4 Character Shuffle Preprocessing Searching Process 272
4 Implementat?on Results 273
5 Conclusion 274
References 275
26 An Efficient Data Encryption Through Image via Prime Order Symmetric Key and Bit Shuffle Technique 276
Abstract 276
1 Introduction 276
2 One-Time Padding, AES, RSA 277
3 Proposed System 278
3.1 Prime Order Symmetric Key Algorithm 279
3.2 Data Hide into Image 279
3.3 Bit Shuffle Encryption Technique 280
3.4 Compression and Decompression Image 280
4 Experimental Result 281
5 Conclusion 285
References 285
27 Peak Detection and Correlation Analysis in Noisy Time Series Data 286
Abstract 286
1 Introduction 286
1.1 Flow Chart of Proposed Work 287
2 Smoothening and Data Validation 288
3 Algorithm 289
3.1 Simple Peak-Finding Algorithm 289
4 Correlation Analysis 290
5 Experimental Results 290
5.1 Detection of Peaks 290
5.2 Results of Correlation Analysis 291
5.2.1 Long-Term Variation 291
6 Conclusion 295
Acknowledgements 295
References 296
28 Novel Hash Based Key Generation for Stream Cipher in Cloud 297
Abstract 297
1 Introduction 297
2 Cloud Computing Security Concerns 299
2.1 Security Issues in Cloud 299
2.2 Information Security Requirements 300
3 Related Work 300
4 Proposed Method 301
4.1 Key Generation 301
4.2 Encryption 302
4.3 Decryption 302
5 Experimental Results 303
6 Conclusion 304
References 304
29 PSNM: An Algorithm for Detecting Duplicates in Oceanographic Data 305
Abstract 305
1 Introduction 305
2 PSNM Algorithm 306
3 Data Validation 307
4 Flow Chart of Duplicate Detection 307
5 Experimental Results 309
6 Conclusion 310
Acknowledgements 311
References 311
30 Detecting and Correcting the Degradations of Sensors on Argo Floats Using Artificial Neural Networks 312
Abstract 312
1 Introduction 313
2 Artificial Neural Network 314
2.1 Feed Forward Neural Network 314
2.2 Back Propagation Neural Network 314
2.2.1 Actual Algorithm 315
2.3 Training Neural Network 315
2.3.1 Supervised Learning 315
3 Data 316
4 Flow Chart of Algorithm 317
5 Results and Discussion 318
6 Conclusion 320
Acknowledgement 321
References 321
31 Bit Resultant Matrix for Mining Quantitative Association Rules of Bipolar Item Sets 322
Abstract 322
1 Introduction 322
2 Related Work 323
3 Proposed Work 324
4 Result and Analysis 325
5 Conclusion 326
Bibliography 326
32 Application of Ant Colony Optimization Techniques to Predict Software Cost Estimation 328
Abstract 328
1 Introduction 329
2 Literature Review 329
3 Data Description and Data Preparation 331
4 Methodology 332
4.1 Ant Colony Optimization 332
5 Results and Discussions 333
6 Conclusion 336
References 336
33 Cloud-Based e-Healthcare Service System Design for On-Demand Affordable Remote Patient Care 339
Abstract 339
1 Introduction 339
2 Background and Motivation 340
3 Proposed System Design 340
3.1 Interactive Cloud Storage 341
3.2 Healthcare Device 342
4 Software Components of the System 342
4.1 Data Security 343
5 Experimental Setup 343
6 Result and Analysis 344
7 Conclusion 346
References 347
34 A Streamlined Approach of Cloud Certificate Less Authentication Scheme Using ASCII Code Data Encryption Technique 348
Abstract 348
1 Introduction 348
1.1 Cloud Data Encryption Issues 349
1.2 Importance of the Subject, Who Holds Encryption Keys 349
1.3 Using Well Vetted Algorithms with Very Strong Proofs of Security 349
2 Related Work 349
2.1 Deployment of Infrastructure 349
2.2 Secret Key Management 350
3 Existing System 350
4 Proposed System 351
4.1 Secret Key Auditing Protocol 351
4.2 Encryption Process 352
4.3 Decryption Process 353
5 Experimental Results 353
6 Conclusion 355
References 355
35 Improved Identity Based Digital Signature Authentication Using Feistel Algorithm in Cloud Computing 357
Abstract 357
1 Introduction 357
2 Related Work 358
2.1 Data Managing/Handling 358
2.2 Entities 358
3 Existing System 359
4 Proposed System 359
5 Results 360
6 Conclusion 363
References 364
36 Securing BIG DATA: A Comparative Study Across RSA, AES, DES, EC and ECDH 365
Abstract 365
1 Introduction 365
2 HADOOP Based Cloud Data Center 367
3 Related Work 367
4 Comparative Study of Cryptographic Algorithms Over HADOOP Based Cloud Data Center 368
4.1 Scenario 1 369
4.2 Scenario 2 369
4.3 Scenario 3 370
5 Conclusion 371
References 371
37 Signal Condition and Acquisition System for a Low Cost EMG Based Prosthetic Hand 373
Abstract 373
1 Introduction 373
1.1 Muscle of the Forearm 374
1.2 Characteristic of EMG Signal 375
2 Systems Analysis and Selection of Hardware 375
3 EMG Signal Conditioning System 376
3.1 Trapping of EMG Signals 377
3.2 Signal Conditioning 377
3.3 Interfaces with the Microcontroller 377
4 Results 378
5 Observations 378
6 Conclusion 380
References 380
38 Wireless Monitoring of NH3 (Ammonia) Using WO3 Thin Film Sensor 382
Abstract 382
1 Introduction 383
2 Conductometric Gas Sensors 384
3 Block Diagram of the Signal Conditioning System 384
4 Synthesis of Tungsten Oxide (WO3) 385
5 Characterization 386
5.1 Chemical Characterization: X-Ray Diffraction (XRD) 386
5.2 Electrical Characterization: I-V Characterization 387
6 Results 388
7 Conclusion 389
References 389
39 Big Data Layers and Analytics: A Survey 391
Abstract 391
1 Introduction 391
2 Background 392
3 Architecture and Layers of the Big Data 393
3.1 Big Data Sources/Data Generation 394
3.2 Acquisition Layer 394
3.2.1 Data Collection 395
3.2.2 Data Transmission 395
3.2.3 Data Preprocessing 396
3.3 Storage Layer 396
3.4 Data Analytics Layer 397
3.4.1 Text Analytics 397
3.4.2 Audio Analytics 398
3.4.3 Video Analytics 399
3.4.4 Social Media Analytics 399
4 Conclusion 399
References 400
40 A More Efficient and Secure Untraceable Remote User Password Authentication Scheme Using Smart Card with Session Key Agreement 402
Abstract 402
1 Introduction 403
2 The Proposed Scheme 404
2.1 Registration Phase 405
2.2 Login Phase 406
2.3 Authentication Phase 406
2.4 Password Change Phase 407
3 Security Analysis of Proposed Scheme 407
3.1 Prevent (Insider) Conspirator Attack 408
3.2 Prevent Destruction/Loss of Smart Card Attack 408
3.3 Prevent User Pose and Server Mask Attack 408
3.4 Prevent Online Password Imagination/Guessing Attack 409
3.5 Prevent Repeated/Replay Attack 409
3.6 Prevent Lifted Verifier Attack 409
3.7 Prevent Denial of Service (DOS) Attack 410
4 Goal/Achievement of Proposed Scheme 410
4.1 Provides Forward Secrecy 410
4.2 User Identity is Unidentified/Untraceable 410
4.3 Inherent/Inbuilt Verification Mechanism of Smart Card 411
4.4 Provides Proper Mutual Authentication 411
4.5 Provision for Common Session Key Generation 411
4.6 Provides Better Password Update Facility 411
5 Performance Analysis and Security Requirement Characteristics 412
6 Conclusion 416
References 416
41 Avoiding Slow Running Nodes in Distributed Systems 418
Abstract 418
1 Introduction 419
2 Related Work 419
3 Proposed Solution 420
4 Experimental Setup 424
4.1 Cluster Setup 424
4.2 Workloads 425
4.3 Datasets 425
5 Result and Conclusion 426
Acknowledgements 427
References 427
42 Region Based Semantic Image Retrieval Using Ontology 428
Abstract 428
1 Introduction 428
2 Related Work 429
2.1 Our Approach 430
2.2 Outline of the Paper 430
3 The Proposed Method 430
3.1 Initial Semantic Image Retrieval 431
3.2 Refine Retrieval Results by Using Ontology 431
4 Experimental Results 432
5 Conclusion 433
References 434
43 Validation of Lehman Laws of Growth and Familiarity for Open Source Java Databases 436
Abstract 436
1 Introduction 436
2 Related Work 438
3 Data Collection Methodology 438
4 Validation of Law of Evolution for Growth Attributes of Databases 440
5 Conclusion 442
References 443
44 Genetic Algorithm and Particle Swarm Optimization: Analysis and Remedial Suggestions 444
Abstract 444
1 Introduction 444
2 Analysis: GA and PSO 445
3 Discussion 447
4 Conclusions 448
References 448
45 A Dual Phase Probabilistic Model for Dermatology Classification 449
Abstract 449
1 Introduction 449
2 Related Work 450
3 Proposed Probabilistic Model 452
4 Results 454
5 Conclusion 455
References 455
46 Performance Evaluation of Reproduction Operators in Genetic Algorithm 457
Abstract 457
1 Introduction 457
2 Genetic Algorithm and the Reproduction Operators Adapted 458
3 Computational Experiment, Analysis and Observations 459
4 Conclusions 465
References 465
47 Rolling Circle Algorithm for Routing Along the Boundaries of Wireless Sensor Networks 467
Abstract 467
1 Introduction 467
2 Related Work 469
3 System Model and Terminology 470
4 Rolling Circle Algorithm 470
5 Simulation Results 474
6 Conclusion 475
References 476
48 Improving Shared Cache Performance Using Variation of Bit Set Insertion Policy 477
Abstract 477
1 Introduction 477
2 Objectives of the Study 478
3 Bit Set Insertion Policy (BSIP) with Random Implementation 478
4 Proposed Algorithm 480
5 Output Evaluation 481
6 Conclusion 485
References 485
49 Phrase Based Web Document Clustering: An Indexing Approach 486
Abstract 486
1 Introduction 487
2 Structure of a Webpage 489
2.1 Representation of a Web Page 489
3 Document Index Graph 490
3.1 Structure of the Web Page Based on DIG 490
3.2 Graph Construction 492
3.3 Finding Matching Sentences 494
4 Calculating Similarity 494
5 Experimental Results 495
6 Conclusion and Future Research 496
References 496
50 Effectiveness of FPA in Sparse Data Modelling and Optimization 498
Abstract 498
1 Introduction 498
2 Flower Pollination Algorithm 500
3 Experimental Work 502
4 Fitness Formulation for Prediction Problem 502
4.1 Implementation Function 502
4.2 Formulation of Objective Function for Prediction Model 503
5 Comparison of Performance 504
6 Conclusion 505
References 505
51 Voice Recognition Based on Vector Quantization Using LBG 507
Abstract 507
1 Introduction 507
2 Structure of Voice Recognition System 508
3 Feature Vector Representation 509
4 Vector Quantization 512
5 Algorithm Approach 513
6 Conclusion and Future Scope 514
References 515
52 Improved In-System Debugging of High Level Synthesis Generated FPGA Circuits 516
Abstract 516
1 Introduction 516
2 Background 517
3 Observability Ports 518
3.1 Event Observability Ports 518
3.2 Tracing Event Observability Ports 518
4 Timing and Event Order Recovery 519
5 Experimental Results 520
5.1 Tool Setup 520
5.2 Results 520
6 Conclusion 521
References 522
53 Design of Cascaded Hybrid Interleaver for Fast Turbo Coding and Decoding 523
Abstract 523
1 Introduction 523
2 Block Interleaver 525
3 3GPP Interleaver 525
3.1 Bits-Input to Rectangular Matrix with Padding 525
4 Hybrid Interleaver 526
5 Simulation Results 527
6 Conclusion 532
References 532
54 Multi User Authentication in Reliable Data Storage in Cloud 533
Abstract 533
1 Introduction 534
2 BGKM Security Procedure with Architecture 535
3 BGKM with SHAMIR 536
4 Experimental Evaluation 537
5 Conclusion 540
References 541
55 Bio-Inspired Approach for Energy Aware Cluster Head Selection in Wireless Sensor Networks 542
Abstract 542
1 Introduction 543
2 Related Work 544
3 Problem Formulation 545
4 Energy Consumption Model for WSNs 545
5 Firefly Algorithm for CH Selection 546
6 Simulation Environment 547
6.1 Results Evaluation 548
7 Conclusion 550
References 550
56 Performance of Slotted Hexagonal Patch for Wireless Applications 552
Abstract 552
1 Introduction 552
2 Geometry of the Proposed Antenna 553
3 Parametric Analysis of the Antenna 555
3.1 Tuning Parameters 555
3.2 Case1: Varying ‘Sl1’ 556
3.3 Case 2: Varying ‘Sw2’ 557
4 Conclusion 558
References 558
57 On the Notch Band Characteristics of Ring Antenna 559
Abstract 559
1 Introduction 559
2 Conventional Circular Patch Antenna 560
3 Proposed Circular Ring Patch Antennas 560
4 Results and Discussion 563
5 Conclusion 564
References 565
58 Design of a Compact Wideband Bow-Tie Dielectric Stacked Patch Antenna for Ku-Band Spectrum 566
Abstract 566
1 Introduction 566
2 Stacked Dielectric Patch Antenna Design 568
3 Parametric Study 569
4 Simulation Results 571
4.1 Simulated Return Loss and VSWR Characteristics of the Proposed Antenna 571
4.2 Simulated Gain Versus Frequency Characteristics of the Proposed Antenna 572
4.3 Radiation Characteristics of the Proposed Antenna 573
5 Conclusion 573
Acknowledgements 573
References 574
59 Design of Scan Cell for System on Chip Scan Based Debugging Applications 575
Abstract 575
1 Introduction 575
2 Limitations of Debugging Due to Cross Clock Domain 577
2.1 Data Invalidation 577
2.2 Clock-Phase Relationship Inconsistency 578
3 Proposed Design for Debug Techniques 579
3.1 Scan Cell Design 579
3.2 Debug Control 580
4 Experimental Results 582
5 Conclusions 583
References 584
60 Performance of Optimized Reversible Vedic Multipliers 585
Abstract 585
1 Introduction 586
2 Review on Vedic Mathematics and Reversible Logic 586
3 Urdhva Tiryakbhayam Multiplication Algorithms 587
3.1 Optimization of the UT Multiplier 587
3.2 Improved 2 × 2 UT Multiplier 588
4 Simulation Results and Discussions 590
5 Conclusion 591
References 591
61 A Novel Congestion Control Scheme in VANET 592
Abstract 592
1 Introduction 593
2 Need for Congestion Control Scheme in VANET 593
3 Related Work 594
4 Implementation 595
5 Results 597
6 Conclusion 598
References 599
62 An Enhanced Spray-Copy-Wait DTN Routing Using Optimized Delivery Predictability 600
Abstract 600
1 Introduction 601
2 Related Work 602
2.1 Spray-and-Wait Routing Protocol 602
2.2 PRoPHET Routing Protocol 602
3 Proposed Work 602
3.1 Optimally Forwarding Increased Replica 602
3.2 Message Removal Operation 603
4 Performance Evaluation 603
4.1 Simulation Scenario 603
5 Results and Discussion 604
5.1 Message Arrival Rate w.r.t. Message Generation Interval 604
5.2 Overhead w.r.t. Message Generation Interval 605
5.3 Comparison Analysis 606
6 Conclusion 606
References 607
63 Impact of Facebook’s Check-in Feature on Users of Social Networking Sites 608
Abstract 608
1 Introduction 609
2 Related Work 610
3 Methodology 611
4 Result and Analysis 613
5 Conclusion 615
6 Future Scope and Limitation 615
References 616
Author Index 618

Erscheint lt. Verlag 2.5.2017
Reihe/Serie Lecture Notes in Networks and Systems
Zusatzinfo XXXI, 623 p. 317 illus.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Computer and Internet Security • conference proceedings • Green Computing • IC3T 2016 • IC3T Proceedings • ICT and Applications • Knowledge management and Networks • Molecular and Cellular Computing • Sensor and Computer networks
ISBN-10 981-10-3226-2 / 9811032262
ISBN-13 978-981-10-3226-4 / 9789811032264
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 19,0 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90