International conference on innovative computing and communications :
[Book]
proceedings of ICICC 2018.
edited by Siddhartha Bhattacharyya, Aboul Ella Hassanien, Deepak Gupta, Ashish Khanna, Indrajit Pan.
Volume 1 /
Singapore :
Springer,
[2019]
1 online resource (394 pages)
Lecture Notes in Networks and Systems Ser. ;
v. 55
3.2 For Reduce Time and Money Used in Waste Collection.
Intro; ICICC-2018 Steering Committee Members; ICICC-2018 Advisory Committee; Preface; About the Book (Volume 1); Contents; About the Editors; Designing an Intelligent Jammer for Targeted 802.11b/g/n based Network Devices; 1 Introduction; 2 Related Work; 3 Jamming Techniques; 4 Methodology; 4.1 Algorithm; 5 Results and Analysis; 6 Conclusion; References; Hardware Implementation of Public Key Cryptography for Small-Scale Devices; 1 Introduction; 2 Literature Review; 2.1 Encryption; 2.2 Hashing; 3 Proposed Work; 3.1 Implementation Details; 4 Conclusion; References.
2 Related Work3 Background; 4 Proposed Methodology; 4.1 Add Selfish Behavior; 4.2 Detection and Mitigation of Selfish Behavior; 5 Simulation and Results; 5.1 Effect on Overhead Ratio; 5.2 Effect on Delivery Ratio; 5.3 Effect on Latency; 6 Conclusion; References; Multithreaded Query Processing Using Quadtree; 1 Introduction; 2 Literature Review; 3 Proposed Methodology; 4 Result and Analysis; 5 Time-Space Complexity; 6 Conclusion and Future Scope; References; Automated Trashcan; 1 Introduction; 2 Literature Survey; 3 Proposed Approach; 3.1 For Automatic Overflow Detection System.
3 Proposed Method3.1 Image Acquisition; 3.2 Converting the Videos into Frames by Frames; 3.3 Image Matching Technique Using SIFT and SURF; 4 Result and Discussion; 4.1 Setup; 4.2 Experiment; 4.3 Performance Evaluation Based on Execution Time; 5 Conclusion; References; A Survey on Cross-Layer Design Approach for Secure Wireless Sensor Networks; 1 Introduction; 2 Demand for Cross-Layer Design Approach; 3 A Scenario of Cross-Layer Design; 4 Comparative Study of Cross-Layer Protocols in WSN; 5 Challenges and Issues in Cross-Layer Design; 6 Performance Variations; 7 Conclusion; References.
Consumer Behavior Toward Mobile Phone Handsets1 Introduction; 2 Literature Review; 3 Objectives; 4 Research Gap; 5 Hypothesis; 6 Research Methodology; 7 Analysis and Interpretation; 8 Findings; 9 Conclusions; 10 Limitations; References; Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography; 1 Introduction; 2 Literature Review; 3 Proposed Work; 4 Proposed Algorithm; 5 Implementation Figures; 6 Conclusion and Future Work; References; A Decentralized Self-detection Mechanism to Defend Selfish Behavior in Spray and Wait Protocol; 1 Introduction.
Proof-of-Participation: Implementation of Proof-of-Stake Through Proof-of-Work1 Introduction; 2 Background; 2.1 Proof-Work (PoW); 2.2 Limitations of PoW; 2.3 Proof-of-Stake (PoS); 2.4 Limitations of PoS; 3 Proof-of-Participation Protocol; 4 Reward Distribution; 5 Discussion; 6 Conclusion; References; Unfolding the Mystery of Ransomware; 1 Introduction; 2 Background; 3 Process of Ransomware; 4 Prevention Techniques; 5 Conclusion and Future Work; References; IOT-Based Smart Museum Using Wearable Device; 1 Introduction; 1.1 Existing Methodologies; 1.2 Objective; 2 Literature Survey.
0
8
8
8
8
The book includes high-quality research papers presented at the International Conference on Innovative Computing and Communication (ICICC 2018), which was held at the Guru Nanak Institute of Management (GNIM), Delhi, India on 5-6 May 2018. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.
Springer Nature
com.springer.onix.9789811323249
International Conference on Innovative Computing and Communications : Proceedings of ICICC 2018, Volume 1.