Novel Algorithms and Techniques in Telecommunications and Networking (eBook)

eBook Download: PDF
2010 | 2010
XII, 517 Seiten
Springer Netherlands (Verlag)
978-90-481-3662-9 (ISBN)

Lese- und Medienproben

Novel Algorithms and Techniques in Telecommunications and Networking -
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Novel Algorithms and Techniques in Telecommunications and Networking includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Industrial Electronics, Technology and Automation, Telecommunications and Networking. Novel Algorithms and Techniques in Telecommunications and Networking includes selected papers form the conference proceedings of the International Conference on Telecommunications and Networking (TeNe 08) which was part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2008).


Novel Algorithms and Techniques in Telecommunications and Networking includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Industrial Electronics, Technology and Automation, Telecommunications and Networking. Novel Algorithms and Techniques in Telecommunications and Networking includes selected papers form the conference proceedings of the International Conference on Telecommunications and Networking (TeNe 08) which was part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2008).

IP Application Test Framework 14
Threshold Based Call Admission Control for QoS Provisioning in Cellular Wireless Networks with Spectrum Renting 28
Preventing the “Worst Case Scenario:” Combating the Lost Laptop Epidemic with RFID Technology 39
Information Security and System Development 44
A Survey of Wireless Sensor Network Interconnection to External Networks 50
Comparing the Performance of UMTS and Mobile WiMAX Convolutional Turbo Code 56
Localization and Frequency of Packet Retransmissionas Criteria for Successful Message Propagation in Vehicular Ad Hoc Networks 67
Path Failure Effects on Video Quality in Multihomed Environments 88
Improving BGP Convergence Time via MRAI Timer 111
Enhanced Reconfigurability for MIMO Systems using Parametric Arrays 123
Modified LEACH – Energy Efficient Wireless Networks Communication 129
Intrusion Detection and Classification of Attacks in High- Level Network Protocols Using Recurrent Neural Networks 134
Besides Tracking – Simulation of RFID Marketing and Beyond 148
Light Path Provisioning using Connection Holding Time and Flexible Window 154
Performance of the Duo-Binary Turbo Codes in WiMAX Systems 166
A unified event reporting solution for wireless sensor networks 171
A Low Computational Complexity Multiple Description Image Coding Algorithm Based on JPEG Standard 177
Genetic Optimization for Optimum 3G Network Planning: an Agent- Based Parallel Implementation 193
A Survey about IEEE 802.11e for better QoS in WLANs 199
Method of a Signal Analysis for Imitation Modeling in a Real- Time Network 205
Simple yet efficient NMEA sentence generator for testing GPS reception firmware and hardware. 211
Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks 215
Modeling Trust in Wireless Ad-Hoc Networks 221
Address Management in MANETs Using an Ant Colony Metaphor 226
Elitism Between Populations For The Improvement Of The Fitness Of A Genetic Algorithm Solution 232
A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks 241
A Dynamic Scheme For Authenticated Group Key Agreement Protocol 247
Performance Evaluation of TCP Congestion Control Mechanisms 253
A New Methodology for Self Localization in Wireless Sensor Networks 265
A Novel Optimization of the Distance Source Routing ( DSR) Protocol for the Mobile Ad Hoc Networks ( MANET) 271
A New Analytical Model for Maximizing the Capacity and Minimizing the Transmission Delay for MANET 277
Faulty Links Optimization for Hypercube Networks via Stored and Forward One- Bit Round Robin Routing Algorithm 282
A Software Solution for Mobile Context 306
Handoff in WLANs 306
Robust Transmission of Video Stream over Fading Channels 311
An Attack Classification Tool Based On Traffic Properties and Machine Learning 317
Security Aspects of Internet based Voting 328
Middleware-based distributed heterogeneous simulation 332
Analysis of the flooding search algorithm with OPNET 337
An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks 352
Design and Implementation of a Multi-sensor Mobile Platform 364
Methods based on fuzzy sets to solve problems of Safe Ship control 370
An Adaptive Combiner-Equalizer for Multiple- Input Receivers 381
KSAm – An Improved RC4 Key-Scheduling Algorithm for Securing WEP 387
Ubiquitous Media Communication Algorithms 393
An Energy and Distance Based Clustering Protocol for Wireless Sensor Networks 404
Encoding Forensic Multimedia Evidence from MARF Applications as Forensic Lucid Expressions 408
Distributed Modular Audio Recognition Framework ( DMARF) and its Applications Over Web Services 412
The Authentication Framework within the Java Data Security Framework ( JDSF): Design and Implementation Refinement 418
Performance Evaluation of MPLS Path Restoration Schemes using OMNET++ 425
Enhancing Sensor Network Security with RSL Codes 437
The Integrity Framework within the Java Data Security Framework ( JDSF): Design and Implementation Refinement 442
A new clustered Directed Diffusion Algorithm based on credit of nodes for wireless sensor networks 467
Multiview Media Transmission Algorithm for Next Generation Networks 472
A 4GHz Clock Synchronized Non Coherent Energy Collection UWB Transceiver 477

Erscheint lt. Verlag 30.1.2010
Zusatzinfo XII, 517 p.
Verlagsort Dordrecht
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte algorithms • book1 • cisse09 • Networking • Network Security • Routing • telecommunications • Transceiver • Wireless Technologies
ISBN-10 90-481-3662-8 / 9048136628
ISBN-13 978-90-481-3662-9 / 9789048136629
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 30,4 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Martin Linten; Axel Schemberg; Kai Surendorf

eBook Download (2023)
Rheinwerk Computing (Verlag)
29,90
Das umfassende Handbuch

von Michael Kofler; Charly Kühnast; Christoph Scherbeck

eBook Download (2024)
Rheinwerk Computing (Verlag)
33,68
Grundlagen der IPv4- und IPv6-Kommunikation

von Anatol Badach; Erwin Hoffmann

eBook Download (2022)
Carl Hanser Verlag GmbH & Co. KG
69,99