Novel Algorithms and Techniques in Telecommunications and Networking (eBook)
XII, 517 Seiten
Springer Netherlands (Verlag)
978-90-481-3662-9 (ISBN)
Novel Algorithms and Techniques in Telecommunications and Networking includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Industrial Electronics, Technology and Automation, Telecommunications and Networking. Novel Algorithms and Techniques in Telecommunications and Networking includes selected papers form the conference proceedings of the International Conference on Telecommunications and Networking (TeNe 08) which was part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2008).
Novel Algorithms and Techniques in Telecommunications and Networking includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Industrial Electronics, Technology and Automation, Telecommunications and Networking. Novel Algorithms and Techniques in Telecommunications and Networking includes selected papers form the conference proceedings of the International Conference on Telecommunications and Networking (TeNe 08) which was part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2008).
IP Application Test Framework 14
Threshold Based Call Admission Control for QoS Provisioning in Cellular Wireless Networks with Spectrum Renting 28
Preventing the “Worst Case Scenario:” Combating the Lost Laptop Epidemic with RFID Technology 39
Information Security and System Development 44
A Survey of Wireless Sensor Network Interconnection to External Networks 50
Comparing the Performance of UMTS and Mobile WiMAX Convolutional Turbo Code 56
Localization and Frequency of Packet Retransmissionas Criteria for Successful Message Propagation in Vehicular Ad Hoc Networks 67
Path Failure Effects on Video Quality in Multihomed Environments 88
Improving BGP Convergence Time via MRAI Timer 111
Enhanced Reconfigurability for MIMO Systems using Parametric Arrays 123
Modified LEACH – Energy Efficient Wireless Networks Communication 129
Intrusion Detection and Classification of Attacks in High- Level Network Protocols Using Recurrent Neural Networks 134
Besides Tracking – Simulation of RFID Marketing and Beyond 148
Light Path Provisioning using Connection Holding Time and Flexible Window 154
Performance of the Duo-Binary Turbo Codes in WiMAX Systems 166
A unified event reporting solution for wireless sensor networks 171
A Low Computational Complexity Multiple Description Image Coding Algorithm Based on JPEG Standard 177
Genetic Optimization for Optimum 3G Network Planning: an Agent- Based Parallel Implementation 193
A Survey about IEEE 802.11e for better QoS in WLANs 199
Method of a Signal Analysis for Imitation Modeling in a Real- Time Network 205
Simple yet efficient NMEA sentence generator for testing GPS reception firmware and hardware. 211
Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks 215
Modeling Trust in Wireless Ad-Hoc Networks 221
Address Management in MANETs Using an Ant Colony Metaphor 226
Elitism Between Populations For The Improvement Of The Fitness Of A Genetic Algorithm Solution 232
A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks 241
A Dynamic Scheme For Authenticated Group Key Agreement Protocol 247
Performance Evaluation of TCP Congestion Control Mechanisms 253
A New Methodology for Self Localization in Wireless Sensor Networks 265
A Novel Optimization of the Distance Source Routing ( DSR) Protocol for the Mobile Ad Hoc Networks ( MANET) 271
A New Analytical Model for Maximizing the Capacity and Minimizing the Transmission Delay for MANET 277
Faulty Links Optimization for Hypercube Networks via Stored and Forward One- Bit Round Robin Routing Algorithm 282
A Software Solution for Mobile Context 306
Handoff in WLANs 306
Robust Transmission of Video Stream over Fading Channels 311
An Attack Classification Tool Based On Traffic Properties and Machine Learning 317
Security Aspects of Internet based Voting 328
Middleware-based distributed heterogeneous simulation 332
Analysis of the flooding search algorithm with OPNET 337
An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks 352
Design and Implementation of a Multi-sensor Mobile Platform 364
Methods based on fuzzy sets to solve problems of Safe Ship control 370
An Adaptive Combiner-Equalizer for Multiple- Input Receivers 381
KSAm – An Improved RC4 Key-Scheduling Algorithm for Securing WEP 387
Ubiquitous Media Communication Algorithms 393
An Energy and Distance Based Clustering Protocol for Wireless Sensor Networks 404
Encoding Forensic Multimedia Evidence from MARF Applications as Forensic Lucid Expressions 408
Distributed Modular Audio Recognition Framework ( DMARF) and its Applications Over Web Services 412
The Authentication Framework within the Java Data Security Framework ( JDSF): Design and Implementation Refinement 418
Performance Evaluation of MPLS Path Restoration Schemes using OMNET++ 425
Enhancing Sensor Network Security with RSL Codes 437
The Integrity Framework within the Java Data Security Framework ( JDSF): Design and Implementation Refinement 442
A new clustered Directed Diffusion Algorithm based on credit of nodes for wireless sensor networks 467
Multiview Media Transmission Algorithm for Next Generation Networks 472
A 4GHz Clock Synchronized Non Coherent Energy Collection UWB Transceiver 477
Erscheint lt. Verlag | 30.1.2010 |
---|---|
Zusatzinfo | XII, 517 p. |
Verlagsort | Dordrecht |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Schlagworte | algorithms • book1 • cisse09 • Networking • Network Security • Routing • telecommunications • Transceiver • Wireless Technologies |
ISBN-10 | 90-481-3662-8 / 9048136628 |
ISBN-13 | 978-90-481-3662-9 / 9789048136629 |
Haben Sie eine Frage zum Produkt? |
![PDF](/img/icon_pdf_big.jpg)
Größe: 30,4 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich