Keywords:
Computer networks.
;
Electronic books.
Type of Medium:
Online Resource
Pages:
1 online resource (276 pages)
Edition:
1st ed.
ISBN:
9783030206154
Series Statement:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series ; v.276
URL:
https://ebookcentral.proquest.com/lib/geomar/detail.action?docID=5918016
DDC:
4.5999999999999996
Language:
English
Note:
Intro -- Preface -- Organization -- Contents -- Performance Analysis of Femtocell on Channel Allocation -- Abstract -- 1 Introduction -- 2 System Configuration -- 3 Design and Analysis -- 3.1 Models and Their Blocking Probabilities -- 3.2 Other Performance Parameters -- 4 Results and Discussion -- 5 Conclusion -- References -- System Level Performance Analysis of Designed LNA and Down Converter for IEEE 802.11ad Receiver -- Abstract -- 1 Introduction -- 2 Design of Receiver Components -- 2.1 Design of Low Noise Amplifier -- 2.2 Design of RF Down Converter -- 2.3 Nonlinearity Issue of Down Converter -- 3 System Level Development of IEEE 802.11ad Receiver -- 4 Results and Discussions -- 4.1 Performance of LNA and Down Converter -- 4.2 Impact of Nonlinearity of Down Converter on Receiver Performance -- 5 Conclusion -- Funding Information. -- References -- Optimizing Multi Gateway Wireless Mesh Networks for Throughput Improvement -- Abstract -- 1 Introduction -- 2 Proposed Architecture -- 3 Optimizing the IEEE 802.11s WMN -- 3.1 Partitioning the WMN -- 3.2 Load Management Scheme (LMS) Among the Partitions of WMN for QoS -- 3.3 Matrix Model of Partitioned WMN and Its Implementation to Validate Integrity of WMN -- 4 Performance Results and Discussion -- 4.1 Analysis of the IMW -- 4.2 Analysis of Average Packet Transfer Delay in WMN -- 4.3 Analysis of Packet Loss -- 5 Conclusions -- 6 Future Work -- References -- Direction Finding Capability in Bluetooth 5.1 Standard -- Abstract -- 1 Introduction to Bluetooth Standard -- 2 Terminologies and Methodology Used for Direction Finding -- 2.1 General Requirements for Target and Tracker Device -- 2.2 Angle of Departure -- 3 Proposed Packet Design -- 4 Results and Discussion -- 4.1 Hardware Testing Results for Direction Finding Capability -- 5 Conclusion and Future Work -- Acknowledgment -- References.
,
An Investigation of Transmission Properties of Double-Exponential Pulses in Core-Clad Optical Fibers for Communication Application -- Abstract -- 1 Introduction -- 2 Characterization of Gaussian and Double Exponential Pulses -- 2.1 Verification of Simulation Technique Using Gaussian Pulse -- 2.2 Gaussian and Double-Exponential Pulses Used -- 2.3 Dispersion Characteristics of Double Exponential Pulses in Single Mode Fibers -- 2.4 Dispersion Characteristics of Double Exponential Pulses in Multi-mode Fibers -- 3 Results and Discussion -- 4 Conclusion -- References -- Hybrid Energy Efficient and QoS Aware Algorithm to Prolong IoT Network Lifetime -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 3.1 Lifetime of the Network -- 3.2 QoS Stipulation -- 4 Network Architecture -- 4.1 Network Model -- 4.2 Energy Model -- 4.3 Route Discovery Process -- 5 Proposed HEEQA Algorithm -- 6 Simulation and Results -- 6.1 Simulation Model -- 6.2 Simulation Results -- 6.3 Variation of Energy Level -- 6.4 Average End-to-End Delay -- 6.5 Delivery Ratio -- 6.6 Transmission Overhead -- 6.7 Network Lifetime -- 6.8 Network Throughput -- 7 Conclusions and Future Work -- References -- Data Integration and Management in Indian Poultry Sector -- Abstract -- 1 Introduction -- 2 State of Art -- 3 Proposed System -- 4 Implementation -- 5 Conclusion and Future Work -- References -- CA-RPL: A Clustered Additive Approach in RPL for IoT Based Scalable Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Result and Discussion -- 5 Conclusion -- References -- Implementation of Trilateration Based Localization Approach for Tree Monitoring in IoT -- Abstract -- 1 Introduction -- 2 Proposed System -- 3 Implementation and Simulation -- 4 Result and Analysis -- 5 Conclusion and Future Work -- References.
,
Expert System Design for Automated Prediction of Difficulties in Securing Airway in ICU and OT -- Abstract -- 1 Introduction -- 2 Recent Related Work -- 3 Proposed Methodology -- 3.1 Proposed Expert System Approach -- 3.2 Architecture of Proposed Expert System Design -- 3.3 Architecture of Airway Management Physical Parameters -- 3.4 Patients Physical Airway Parameters Associated with Difficult Mask Ventilation -- 3.5 Rulebase Design -- 3.6 Rulebase for Mask Ventilation -- 4 Expert System Implementation -- 4.1 Software Tools Used -- 4.2 Patient Data Processing -- 5 Results Analysis -- 6 Conclusions -- References -- A Comparative Study on Load Balancing Algorithms in Software Defined Networking -- Abstract -- 1 Introduction -- 2 Background and Related Work -- 2.1 SDN Architecture -- 3 Load Balancing Architecture -- 4 Result and Discussion -- 5 Conclusion and Future Work -- Acknowledgment -- References -- CloudSDN: Enabling SDN Framework for Security and Threat Analytics in Cloud Networks -- Abstract -- 1 Introduction -- 2 Background and Motivation -- 2.1 SDN-Enabled Cloud Computing -- 2.2 SDNFV Converged Architecture -- 2.3 SDN - OpenStack Interaction Model -- 2.4 New Opportunities and Challenges in Cloud Security -- 2.5 Related Work -- 3 Proposed Architecture -- 3.1 Architecture Overview -- 3.2 Multi-plane Collaborative Defense -- 3.3 Security Service Function Chaining -- 3.4 Operation of CloudSDN -- 4 Design and Implementation -- 4.1 OpenStack Neutron SDN Layers -- 4.2 OpenvSwitch SDN Data Plane -- 4.3 OpenDaylight SDN Control Plane -- 4.4 Implementation -- 5 Preliminary Experimentation -- 5.1 Comparison with Traditional Snort-Iptables IDS/IPS -- 5.2 Comparison with Classic OpenFlow SDN -- 5.3 Comparison of Linux Bridge/Classic OpenStack/CloudSDN -- 6 Conclusions and Future Work -- References.
,
NB-FTBM Model for Entity Trust Evaluation in Vehicular Ad Hoc Network Security -- 1 Introduction -- 2 Related Work -- 3 Entity Trust Model (ETM) -- 3.1 Entity Identification (E-ID) Module -- 3.2 Entity Reputation (E-RP) Module -- 4 Fuzzy Trust Boundary Model -- 4.1 E-ID Trust Boundary -- 4.2 E-RP Trust Boundary -- 5 Decision making in NB-FTBM -- 5.1 Naive Bayesian theorem -- 6 Performance Evaluation -- 7 Conclusion -- References -- Threshold Cryptography Based Light Weight Key Management Technique for Hierarchical WSNs -- Abstract -- 1 Introduction -- 2 Related Works and Problem Statement -- 3 Network Model -- 3.1 Key Generation Phase -- 3.2 Construction Phase -- 4 Proposed Hierarchal Threshold Scheme -- 4.1 Sharing Phase -- 4.2 Recovering Phase -- 4.3 Network Initialization Phase -- 4.4 Intra Cluster Pairwise Key Generation -- 5 Simulation Results -- 6 Conclusion -- References -- Denoising Epigraphical Estampages Using Nested Run Length Count -- Abstract -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Method -- 4 Results and Discussion -- 5 Conclusion -- Acknowledgement -- References -- Improving Transition Probability for Detecting Hardware Trojan Using Weighted Random Patterns -- Abstract -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Generating the Circuit's Netlist -- 2.2 Determining the Transition Probability for Each Gate -- 2.3 Identifying Suitable Insertion Point -- 2.4 Application of Weighted Random Patterns -- 3 Weighted Random Pattern -- 3.1 Introduction to Weighted Random Number Generator -- 3.2 Weight Random Pattern Number Generator Algorithm -- 3.3 Algorithm for Detection of HTS -- 4 Experimental Results -- 5 Conclusion -- References -- Prefix Tree Based MapReduce Approach for Mining Frequent Subgraphs -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Data Pre-processing -- 3.2 Candidate Generation.
,
3.3 Support Counting -- 4 Experimental Validation and Verification -- 5 Conclusion -- References -- A Taxonomy of Methods and Models Used in Program Transformation and Parallelization -- 1 Introduction -- 2 Taxonomy of Methods Used in Program Transformation -- 2.1 Instruction Count Reduction -- 2.2 Locality Improvement -- 2.3 Memory Latency Reduction -- 2.4 Parallalization Enablement -- 2.5 Transformation Enablement -- 3 Taxonomy of Methods Used in Program Parallelization -- 3.1 Simplicity and Ease of Use -- 3.2 Performance -- 3.3 Granularity -- 3.4 Program Structure or Module -- 3.5 Scalability -- 3.6 Novelty -- 3.7 Orchestration and Management -- 4 Taxonomy of Models Used in Transformation and Parallelization -- 4.1 Tree Based Models -- 4.2 Graph Based Models -- 4.3 Machine Learning Based Models -- 4.4 Models Based on Algebra -- 4.5 Models Based on Statistics -- 4.6 Models Based on Enumeration -- 4.7 Models Based on Heuristics -- 5 A Graphical Taxonomy of Methods and Models Used in Transformation and Parallelization -- 5.1 A Graphical Taxonomy of Methods Used in Transformation -- 5.2 A Graphical Taxonomy of Methods Used in Parallelization -- 5.3 A Graphical Taxonomy of Models Used in Transformation and Parallelization -- 6 Conclusion -- References -- Time Bound Robot Mission Planning for Priority Machine Using Linear Temporal Logic for Multi Goals -- Abstract -- 1 Introduction -- 2 Linear Temporal Logic -- 3 Proposed Methodology -- 3.1 Overall Solution Design -- 3.2 Triangulation -- 4 Mission Solver -- 5 Results and Discussions -- 5.1 Simulation Scenario 1 -- 5.2 Simulation Scenario 2 -- 5.3 Simulation Scenario 3 -- 6 Conclusions -- Acknowledgement -- References -- Author Index.
Permalink