International Conference on Wireless, Intelligent, and Distributed Environment for Communication (eBook)

WIDECOM 2018
eBook Download: PDF
2018 | 1st ed. 2018
XII, 334 Seiten
Springer International Publishing (Verlag)
978-3-319-75626-4 (ISBN)

Lese- und Medienproben

International Conference on Wireless, Intelligent, and Distributed Environment for Communication -
Systemvoraussetzungen
149,79 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications.

The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book's structure and content is organized in such a manner that makes it useful at a variety of learning levels.


  • Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018;
  • Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems;
  • Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.

 



Professor Isaac Woungang received his Ph.D. degree in Mathematics from the University of South, Toulon and Var, France in 1994. From 1999 to 2002, he worked as a software engineer in the Photonic Line Systems Group, Nortel Networks, Ottawa, Ontario, Canada. Since 2002, he has been with Ryerson University, where he is now a full professor of Computer Science and Director of the Distributed Applications and Broadband (DABNEL) Lab. Dr. Woungang has published 8 books and over 89 refereed technical articles in scholarly international journals and proceedings of international conferences and symposiums. He has served as Associate Editor of the Computers and Electrical Engineering (Elsevier). He is currently serving as Associate Editor of the International Journal of Communication Systems (Wiley), and Security and Privacy Journal (Wiley). He has Guest Edited several Special Issues with various reputed journals such as IET Information Security, Mathematical and Computer Modeling (Elsevier), Computer Communications (Elsevier), Computers and Electrical Engineering (Elsevier), and Telecommunication Systems (Springer). He has also edited a book on 'Routing in Opportunistic Networks', by Springer. He is presently a Senior Member of IEEE; and he has served as Chair of Computer Chapter, IEEE Toronto Section, from January 2012 to September 2016.

Professor Sanjay Kumar Dhurandher received the M.Tech., and Ph.D. degrees in Computer Science from the Jawaharlal Nehru University, New Delhi, India. He is currently a Professor with the Division of Information Technology, Netaji Subhas Institute of Technology (NSIT), University of Delhi, New Delhi, India, where he is also the Head of the Information Technology Department. He is even serving as the Head of the Advanced Centre CAITFS, Division of Information Technology, NSIT, University of Delhi. From 1995 to 2000, he was a Scientist/Engineer with the Institute for Plasma Research, Gujarat, India, which is under the Department of Atomic Energy, India. His current research interests include wireless ad-hoc networks, sensor networks, computer networks, network security, underwater sensor networks, opportunistic networks, and cognitive radio networks. Dr. Dhurandher is currently serving as an Associate Editor for the International Journal of Communication Systems and Security and Privacy Journal by John Wiley & Sons. He has also edited a book on 'Routing in Opportunistic Networks', by Springer. He is presently a Senior Member of IEEE.

Professor Isaac Woungang received his Ph.D. degree in Mathematics from the University of South, Toulon and Var, France in 1994. From 1999 to 2002, he worked as a software engineer in the Photonic Line Systems Group, Nortel Networks, Ottawa, Ontario, Canada. Since 2002, he has been with Ryerson University, where he is now a full professor of Computer Science and Director of the Distributed Applications and Broadband (DABNEL) Lab. Dr. Woungang has published 8 books and over 89 refereed technical articles in scholarly international journals and proceedings of international conferences and symposiums. He has served as Associate Editor of the Computers and Electrical Engineering (Elsevier). He is currently serving as Associate Editor of the International Journal of Communication Systems (Wiley), and Security and Privacy Journal (Wiley). He has Guest Edited several Special Issues with various reputed journals such as IET Information Security, Mathematical and Computer Modeling (Elsevier), Computer Communications (Elsevier), Computers and Electrical Engineering (Elsevier), and Telecommunication Systems (Springer). He has also edited a book on “Routing in Opportunistic Networks”, by Springer. He is presently a Senior Member of IEEE; and he has served as Chair of Computer Chapter, IEEE Toronto Section, from January 2012 to September 2016.Professor Sanjay Kumar Dhurandher received the M.Tech., and Ph.D. degrees in Computer Science from the Jawaharlal Nehru University, New Delhi, India. He is currently a Professor with the Division of Information Technology, Netaji Subhas Institute of Technology (NSIT), University of Delhi, New Delhi, India, where he is also the Head of the Information Technology Department. He is even serving as the Head of the Advanced Centre CAITFS, Division of Information Technology, NSIT, University of Delhi. From 1995 to 2000, he was a Scientist/Engineer with the Institute for Plasma Research, Gujarat, India, which is under the Department of Atomic Energy, India. His current research interests include wireless ad-hoc networks, sensor networks, computer networks, network security, underwater sensor networks, opportunistic networks, and cognitive radio networks. Dr. Dhurandher is currently serving as an Associate Editor for the International Journal of Communication Systems and Security and Privacy Journal by John Wiley & Sons. He has also edited a book on “Routing in Opportunistic Networks”, by Springer. He is presently a Senior Member of IEEE.

Preface 6
Acknowledgments 8
Contents 9
About the Authors 11
Tamper Detection Using Fragile Image Watermarking Based on Chaotic System 13
1 Introduction 13
2 Background 14
2.1 Least Significant Bit: LSB Method 14
2.2 Arnold Cat Map 14
2.3 Logistics Maps 15
3 Related Work 15
4 Proposed Work 16
4.1 Embedding Algorithm 17
4.2 Extraction Algorithm 17
Experimental Result 18
Imperceptibility 20
Robustness 21
Comparative Analysis 22
5 Conclusion 22
References 23
Cryptanalysis and Improvement of a User Authentication Scheme for SIP 24
1 Introduction 24
2 Preliminaries 25
3 Review of Lu et al.'s Scheme 25
3.1 Registration 25
3.2 Mutual Authentication and Key Agreement 26
3.3 Password Change Phase 26
4 Weaknesses of Lu et al.'s Scheme 27
4.1 Insider Attack 27
4.2 User Anonymity 27
5 Proposed Scheme 27
5.1 Registration 28
5.2 Mutual Authentication and Key Agreement 28
5.3 Password Change Phase 29
6 Mutual Authentication of Our Scheme Using BAN-Logic 30
7 Security Analysis 31
7.1 Anonymity 31
7.2 Insider Attack 32
7.3 Mutual Authentication 32
7.4 Masquerade Attack 32
7.5 Verifier Attack 32
7.6 Perfect Forward Secrecy 33
7.7 Replay Attack 33
8 Performance Analysis 33
8.1 Security Features 33
8.2 Computational Cost 34
9 Conclusion 34
References 34
Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques 36
1 Introduction 36
2 Related Surveys 40
3 Existing Techniques 43
4 Conclusion and Future Work 45
References 47
Securing Fuzzy Commitment Scheme Against Decodability Attack-Based Cross-Matching 50
1 Introduction 50
2 Fuzzy Commitment Scheme 52
3 Cross-Matching Attacks 53
3.1 Exhaustive Search Attack 54
3.2 Decodability Attack 56
4 Preventing Decodability Attack-Based Cross-Matching 56
4.1 Case 1: Both Hash Value and Auxiliary Data Is Available 57
4.2 Case 2: Only Auxiliary Data Is Available 58
5 Conclusions and Future Work 59
References 59
PiFallD: A Portable Fall Detection System 62
1 Introduction 62
2 Related Works 63
3 System Features 64
4 Method 64
5 Implementation Details 66
5.1 Raspberry Pi and Pi Camera 66
5.2 OpenCV Library 67
Face Detection 67
Contour Detection 68
6 Fall Detection Algorithm 70
6.1 Face Detection Algorithm 70
6.2 Motion Detection Algorithm 71
7 Status and Limitations 72
7.1 Distractive Background 72
7.2 Camera Adjustments 72
7.3 Vigour 73
7.4 Setup 73
7.5 Lifeless Faces 74
8 Evaluation 74
8.1 Data Collection 74
8.2 Detection Performance 75
8.3 Power Consumption 76
9 Future Work 77
10 Conclusion 77
References 78
Analysing, Designing, Implementation and Coding E-Commerce Through UX 79
1 Introduction 79
2 Vision and UX Scope 80
3 *-6pt 81
4 Methodology 86
5 Results 87
6 Conclusion 117
References 117
Performance Evaluation of GAER Over Various Crossover Techniques in Opportunistic Networks 118
1 Introduction 118
2 Related Work and Motivation 119
3 Various Crossover Techniques 120
3.1 One-Point Crossover 120
3.2 Two-Point Crossover 121
3.3 Uniform Crossover 121
3.4 Random Permuting Crossover 122
4 Tabular Illustration 122
5 Simulation Setup 123
6 Results and Analysis 124
6.1 Performance Comparison at Different Number of Nodes 124
6.2 Performance Comparison at Different Time to Live 126
7 Conclusion 127
References 127
Software Performance Measuring Benchmarks 129
1 Introduction 129
2 Systems Performance Criteria and Analysis 130
2.1 Software Reliability Engineering (SRE) 130
2.2 Software Reliability Growth Models 130
2.3 Notation 131
3 Problem Conceptualization and Proposed Approach 131
4 Numerical Illustration and Discussion 134
5 Conclusion 136
References 136
Texture Analysis of Fruits for Its Deteriorated Classification 138
1 Introduction 138
2 Techniques Used 140
2.1 Image Acquisition 140
2.2 Feature Extraction Using Morphology 141
2.3 Image Segmentation 141
2.4 Fruit Grading 142
3 Methodology 143
4 Proposed Algorithm 143
5 Experimental Results 145
6 Conclusion 148
7 Future Scope 148
References 149
Analysis of Packet Size Variation Supporting QoS for Survivable Optical High-Speed Networks 150
1 Introduction 150
2 Network Modeling and Simulation 151
3 Results and Discussions 153
4 Conclusion and Future Scope 157
References 157
An Improved Hybrid Algorithm for Web Usage Mining 159
1 Introduction 159
2 Literature Survey 160
3 Proposed Method 161
3.1 5pt 161
3.2 3pt 163
4 Experimental Results 163
5 Conclusion 165
References 166
Optimal Cache Placement by Identifying Possible Congestion Points in Wireless Sensor Networks 167
1 Introduction 167
2 Literature Review 168
3 Proposed Work 169
3.1 Optimal Cache Placement by Identifying Congestion Points in WSN 169
3.2 Congestion Point Detection 170
3.3 Identification of Cache Points 171
3.4 Optimizing Cache Points 171
4 Simulation and Results 172
5 Conclusion 175
References 175
Automatic Detection of Eczema Using Image Processing 177
1 Introduction 177
2 Architecture and Methodology 178
2.1 Image Preprocessing 180
2.2 Segmentation 180
3 Proposed Algorithm 181
4 Experimental Results and Analysis 183
5 Conclusion 183
6 Future Research Areas 185
References 185
Recognition of Emotions of Speech and Mood of Music: A Review 186
1 Introduction 186
2 Literature Review 187
3 Speech Emotion Recognition Journey 190
4 Popular Model for Speech Recognition [GMM] 190
5 Emotion Recognition Model for Speech 193
6 Features Extraction for Music 194
7 Extraction and Selection of Speech Features 196
8 Methods for Characterization 197
9 Latest Application of Automatic Vocal Recognition 200
10 Conclusion 200
References 201
Estimation of Probability Density Function of Digital Substrate Noise in Mixed Signal System 203
1 Introduction 203
2 Substrate Noise in CMOS Inverter 204
3 Gate-Level Macromodeling 205
4 PDF Parameter Estimation Substrate Noise 207
5 Result and Discussion 211
6 Conclusion 212
References 213
Location-Aware Data Distribution in P2P Mobile Cloud 214
1 Introduction 214
2 Related Work 215
3 Proposed Approach: Mobile Data Cloud (MDC) 217
4 Simulation Results 220
5 Conclusion 223
References 223
EPR: An Encounter and Probability Based Routing Protocolfor Opportunistic Networks 225
1 Introduction 225
2 Related Work and Background 226
2.1 Epidemic Routing Protocol 226
2.2 Prophet Routing Protocol 227
2.3 HBPR 228
2.4 Encounter and Distance-Based Routing Protocol: EDR 228
3 Proposed Scheme: EPR 229
3.1 Motivation 229
3.2 System Model 230
4 Simulation Setup 231
5 Conclusion 236
References 237
Performance Comparison Simulation Model of Ad Hoc Cloud Network with Cloud Servers 238
1 Introduction 238
1.1 Ad Hoc Network 238
1.2 Cloud Computing 238
1.3 Ad Hoc Cloud 239
2 Foundation and Related Work 241
3 Proposed Simulation Model 242
4 Results and Discussions 244
4.1 Wireless LAN Delay 247
4.2 Wireless LAN Media Access Delay 248
4.3 Wireless LAN Load 250
4.4 Wireless LAN Network Load 250
4.5 Wireless LAN Retransmission Attempts 251
4.6 Wireless LAN Throughput 252
5 Conclusion 253
References 258
Path Restoration Versus Link Restoration in Survivable ATMNetworks 260
1 Introduction 260
2 The Path Restoration Model 262
3 The Link Restoration Model 263
4 Separable Augmented Lagrangian Algorithm 264
4.1 SALA 265
5 Comparison of Path and Link Restorations 266
6 Conclusion 268
References 269
Adaptive Error Control Technique for Cluster-Based Underwater Wireless Sensor Networks 270
1 Introduction 270
2 Related Work 271
3 Adaptive Error Control Technique 273
3.1 Impact of Redundant Factor ? in Encoding 273
3.2 3pt 274
3.3 3pt 276
4 Performance Evaluation 276
4.1 Simulation Environment and Parameters 277
4.2 Simulation Results and Analysis 277
5 Conclusion 280
References 281
Analysis of Basic Cognitive Radio and Queuing-Based RequestHandling 282
1 Introduction 282
2 Related Work 283
3 System Model 284
3.1 Primary User 285
3.2 Primary Base 285
3.3 Secondary User 285
3.4 Secondary Base Station 287
Basic Radio 287
Queued Radio 288
4 Results and Analysis 288
4.1 Dependence on Ratio of Users 288
Secondary Usage (Fig. 2) 289
Channel Usage (Fig. 3) 289
4.2 Dependence on Primary User Count 290
Secondary Usage (Fig. 4) 290
Channel Usage (Fig. 5) 290
4.3 Dependence on Secondary User Count 292
Secondary Usage (Fig. 6) 292
Channel Usage (Fig. 7) 293
4.4 Dependence on Primary Requirement 294
Secondary Usage (Fig. 8) 294
Channel Usage (Fig. 9) 295
4.5 Dependence on Secondary Requirement 296
Secondary Usage (Fig. 10) 296
Channel Usage (Fig. 11) 296
4.6 Performance in an Optimum Environment 297
Absolute Performance (Fig. 12) 297
Increase in Performance (Fig. 13) 298
5 Conclusions 299
6 Future Scope and Improvements 299
References 300
Time Validity-Based Message Transmission for College Activities 301
1 Introduction 301
2 Background and Related Work 302
2.1 Epidemic 302
2.2 Prophet 303
2.3 HiBOp 303
2.4 CAR 303
2.5 MaxProp 304
3 Proposed College Campus Routing Protocol 304
3.1 Scenarios Depicting Multiple Situations 313
3.2 Importing Maps in ONE OpenStreetMap 314
4 The Proposed College Model 317
5 Conclusion and Future Work 321
References 322
Index 324

Erscheint lt. Verlag 17.4.2018
Reihe/Serie Lecture Notes on Data Engineering and Communications Technologies
Zusatzinfo XII, 334 p. 137 illus., 100 illus. in color.
Verlagsort Cham
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Web / Internet
Technik Elektrotechnik / Energietechnik
Schlagworte Applications • Computer Science • conference proceedings • Informatics • Information Security • Next Generation Networks • Research • WIDECOM 2018 • Wireless Intelligent Environments for Communication
ISBN-10 3-319-75626-5 / 3319756265
ISBN-13 978-3-319-75626-4 / 9783319756264
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 9,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Strategien, Erfolgsrezepte, Lösungen

von Alexander Steireif; Rouven Alexander Rieker; Markus Bückle

eBook Download (2021)
Rheinwerk Computing (Verlag)
49,90