GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Computer networks. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (276 pages)
    Edition: 1st ed.
    ISBN: 9783030206154
    Series Statement: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series ; v.276
    DDC: 4.5999999999999996
    Language: English
    Note: Intro -- Preface -- Organization -- Contents -- Performance Analysis of Femtocell on Channel Allocation -- Abstract -- 1 Introduction -- 2 System Configuration -- 3 Design and Analysis -- 3.1 Models and Their Blocking Probabilities -- 3.2 Other Performance Parameters -- 4 Results and Discussion -- 5 Conclusion -- References -- System Level Performance Analysis of Designed LNA and Down Converter for IEEE 802.11ad Receiver -- Abstract -- 1 Introduction -- 2 Design of Receiver Components -- 2.1 Design of Low Noise Amplifier -- 2.2 Design of RF Down Converter -- 2.3 Nonlinearity Issue of Down Converter -- 3 System Level Development of IEEE 802.11ad Receiver -- 4 Results and Discussions -- 4.1 Performance of LNA and Down Converter -- 4.2 Impact of Nonlinearity of Down Converter on Receiver Performance -- 5 Conclusion -- Funding Information. -- References -- Optimizing Multi Gateway Wireless Mesh Networks for Throughput Improvement -- Abstract -- 1 Introduction -- 2 Proposed Architecture -- 3 Optimizing the IEEE 802.11s WMN -- 3.1 Partitioning the WMN -- 3.2 Load Management Scheme (LMS) Among the Partitions of WMN for QoS -- 3.3 Matrix Model of Partitioned WMN and Its Implementation to Validate Integrity of WMN -- 4 Performance Results and Discussion -- 4.1 Analysis of the IMW -- 4.2 Analysis of Average Packet Transfer Delay in WMN -- 4.3 Analysis of Packet Loss -- 5 Conclusions -- 6 Future Work -- References -- Direction Finding Capability in Bluetooth 5.1 Standard -- Abstract -- 1 Introduction to Bluetooth Standard -- 2 Terminologies and Methodology Used for Direction Finding -- 2.1 General Requirements for Target and Tracker Device -- 2.2 Angle of Departure -- 3 Proposed Packet Design -- 4 Results and Discussion -- 4.1 Hardware Testing Results for Direction Finding Capability -- 5 Conclusion and Future Work -- Acknowledgment -- References. , An Investigation of Transmission Properties of Double-Exponential Pulses in Core-Clad Optical Fibers for Communication Application -- Abstract -- 1 Introduction -- 2 Characterization of Gaussian and Double Exponential Pulses -- 2.1 Verification of Simulation Technique Using Gaussian Pulse -- 2.2 Gaussian and Double-Exponential Pulses Used -- 2.3 Dispersion Characteristics of Double Exponential Pulses in Single Mode Fibers -- 2.4 Dispersion Characteristics of Double Exponential Pulses in Multi-mode Fibers -- 3 Results and Discussion -- 4 Conclusion -- References -- Hybrid Energy Efficient and QoS Aware Algorithm to Prolong IoT Network Lifetime -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 3.1 Lifetime of the Network -- 3.2 QoS Stipulation -- 4 Network Architecture -- 4.1 Network Model -- 4.2 Energy Model -- 4.3 Route Discovery Process -- 5 Proposed HEEQA Algorithm -- 6 Simulation and Results -- 6.1 Simulation Model -- 6.2 Simulation Results -- 6.3 Variation of Energy Level -- 6.4 Average End-to-End Delay -- 6.5 Delivery Ratio -- 6.6 Transmission Overhead -- 6.7 Network Lifetime -- 6.8 Network Throughput -- 7 Conclusions and Future Work -- References -- Data Integration and Management in Indian Poultry Sector -- Abstract -- 1 Introduction -- 2 State of Art -- 3 Proposed System -- 4 Implementation -- 5 Conclusion and Future Work -- References -- CA-RPL: A Clustered Additive Approach in RPL for IoT Based Scalable Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Result and Discussion -- 5 Conclusion -- References -- Implementation of Trilateration Based Localization Approach for Tree Monitoring in IoT -- Abstract -- 1 Introduction -- 2 Proposed System -- 3 Implementation and Simulation -- 4 Result and Analysis -- 5 Conclusion and Future Work -- References. , Expert System Design for Automated Prediction of Difficulties in Securing Airway in ICU and OT -- Abstract -- 1 Introduction -- 2 Recent Related Work -- 3 Proposed Methodology -- 3.1 Proposed Expert System Approach -- 3.2 Architecture of Proposed Expert System Design -- 3.3 Architecture of Airway Management Physical Parameters -- 3.4 Patients Physical Airway Parameters Associated with Difficult Mask Ventilation -- 3.5 Rulebase Design -- 3.6 Rulebase for Mask Ventilation -- 4 Expert System Implementation -- 4.1 Software Tools Used -- 4.2 Patient Data Processing -- 5 Results Analysis -- 6 Conclusions -- References -- A Comparative Study on Load Balancing Algorithms in Software Defined Networking -- Abstract -- 1 Introduction -- 2 Background and Related Work -- 2.1 SDN Architecture -- 3 Load Balancing Architecture -- 4 Result and Discussion -- 5 Conclusion and Future Work -- Acknowledgment -- References -- CloudSDN: Enabling SDN Framework for Security and Threat Analytics in Cloud Networks -- Abstract -- 1 Introduction -- 2 Background and Motivation -- 2.1 SDN-Enabled Cloud Computing -- 2.2 SDNFV Converged Architecture -- 2.3 SDN - OpenStack Interaction Model -- 2.4 New Opportunities and Challenges in Cloud Security -- 2.5 Related Work -- 3 Proposed Architecture -- 3.1 Architecture Overview -- 3.2 Multi-plane Collaborative Defense -- 3.3 Security Service Function Chaining -- 3.4 Operation of CloudSDN -- 4 Design and Implementation -- 4.1 OpenStack Neutron SDN Layers -- 4.2 OpenvSwitch SDN Data Plane -- 4.3 OpenDaylight SDN Control Plane -- 4.4 Implementation -- 5 Preliminary Experimentation -- 5.1 Comparison with Traditional Snort-Iptables IDS/IPS -- 5.2 Comparison with Classic OpenFlow SDN -- 5.3 Comparison of Linux Bridge/Classic OpenStack/CloudSDN -- 6 Conclusions and Future Work -- References. , NB-FTBM Model for Entity Trust Evaluation in Vehicular Ad Hoc Network Security -- 1 Introduction -- 2 Related Work -- 3 Entity Trust Model (ETM) -- 3.1 Entity Identification (E-ID) Module -- 3.2 Entity Reputation (E-RP) Module -- 4 Fuzzy Trust Boundary Model -- 4.1 E-ID Trust Boundary -- 4.2 E-RP Trust Boundary -- 5 Decision making in NB-FTBM -- 5.1 Naive Bayesian theorem -- 6 Performance Evaluation -- 7 Conclusion -- References -- Threshold Cryptography Based Light Weight Key Management Technique for Hierarchical WSNs -- Abstract -- 1 Introduction -- 2 Related Works and Problem Statement -- 3 Network Model -- 3.1 Key Generation Phase -- 3.2 Construction Phase -- 4 Proposed Hierarchal Threshold Scheme -- 4.1 Sharing Phase -- 4.2 Recovering Phase -- 4.3 Network Initialization Phase -- 4.4 Intra Cluster Pairwise Key Generation -- 5 Simulation Results -- 6 Conclusion -- References -- Denoising Epigraphical Estampages Using Nested Run Length Count -- Abstract -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Method -- 4 Results and Discussion -- 5 Conclusion -- Acknowledgement -- References -- Improving Transition Probability for Detecting Hardware Trojan Using Weighted Random Patterns -- Abstract -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Generating the Circuit's Netlist -- 2.2 Determining the Transition Probability for Each Gate -- 2.3 Identifying Suitable Insertion Point -- 2.4 Application of Weighted Random Patterns -- 3 Weighted Random Pattern -- 3.1 Introduction to Weighted Random Number Generator -- 3.2 Weight Random Pattern Number Generator Algorithm -- 3.3 Algorithm for Detection of HTS -- 4 Experimental Results -- 5 Conclusion -- References -- Prefix Tree Based MapReduce Approach for Mining Frequent Subgraphs -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Data Pre-processing -- 3.2 Candidate Generation. , 3.3 Support Counting -- 4 Experimental Validation and Verification -- 5 Conclusion -- References -- A Taxonomy of Methods and Models Used in Program Transformation and Parallelization -- 1 Introduction -- 2 Taxonomy of Methods Used in Program Transformation -- 2.1 Instruction Count Reduction -- 2.2 Locality Improvement -- 2.3 Memory Latency Reduction -- 2.4 Parallalization Enablement -- 2.5 Transformation Enablement -- 3 Taxonomy of Methods Used in Program Parallelization -- 3.1 Simplicity and Ease of Use -- 3.2 Performance -- 3.3 Granularity -- 3.4 Program Structure or Module -- 3.5 Scalability -- 3.6 Novelty -- 3.7 Orchestration and Management -- 4 Taxonomy of Models Used in Transformation and Parallelization -- 4.1 Tree Based Models -- 4.2 Graph Based Models -- 4.3 Machine Learning Based Models -- 4.4 Models Based on Algebra -- 4.5 Models Based on Statistics -- 4.6 Models Based on Enumeration -- 4.7 Models Based on Heuristics -- 5 A Graphical Taxonomy of Methods and Models Used in Transformation and Parallelization -- 5.1 A Graphical Taxonomy of Methods Used in Transformation -- 5.2 A Graphical Taxonomy of Methods Used in Parallelization -- 5.3 A Graphical Taxonomy of Models Used in Transformation and Parallelization -- 6 Conclusion -- References -- Time Bound Robot Mission Planning for Priority Machine Using Linear Temporal Logic for Multi Goals -- Abstract -- 1 Introduction -- 2 Linear Temporal Logic -- 3 Proposed Methodology -- 3.1 Overall Solution Design -- 3.2 Triangulation -- 4 Mission Solver -- 5 Results and Discussions -- 5.1 Simulation Scenario 1 -- 5.2 Simulation Scenario 2 -- 5.3 Simulation Scenario 3 -- 6 Conclusions -- Acknowledgement -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...