International conference on innovative computing and communications :
نام عام مواد
[Book]
ساير اطلاعات عنواني
proceedings of ICICC 2018.
نام نخستين پديدآور
edited by Siddhartha Bhattacharyya, Aboul Ella Hassanien, Deepak Gupta, Ashish Khanna, Indrajit Pan.
مشخصه جلد
Volume 1 /
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Singapore :
نام ناشر، پخش کننده و غيره
Springer,
تاریخ نشرو بخش و غیره
[2019]
مشخصات ظاهری
نام خاص و کميت اثر
1 online resource (394 pages)
فروست
عنوان فروست
Lecture Notes in Networks and Systems Ser. ;
مشخصه جلد
v. 55
يادداشت کلی
متن يادداشت
3.2 For Reduce Time and Money Used in Waste Collection.
یادداشتهای مربوط به مندرجات
متن يادداشت
Intro; ICICC-2018 Steering Committee Members; ICICC-2018 Advisory Committee; Preface; About the Book (Volume 1); Contents; About the Editors; Designing an Intelligent Jammer for Targeted 802.11b/g/n based Network Devices; 1 Introduction; 2 Related Work; 3 Jamming Techniques; 4 Methodology; 4.1 Algorithm; 5 Results and Analysis; 6 Conclusion; References; Hardware Implementation of Public Key Cryptography for Small-Scale Devices; 1 Introduction; 2 Literature Review; 2.1 Encryption; 2.2 Hashing; 3 Proposed Work; 3.1 Implementation Details; 4 Conclusion; References.
متن يادداشت
2 Related Work3 Background; 4 Proposed Methodology; 4.1 Add Selfish Behavior; 4.2 Detection and Mitigation of Selfish Behavior; 5 Simulation and Results; 5.1 Effect on Overhead Ratio; 5.2 Effect on Delivery Ratio; 5.3 Effect on Latency; 6 Conclusion; References; Multithreaded Query Processing Using Quadtree; 1 Introduction; 2 Literature Review; 3 Proposed Methodology; 4 Result and Analysis; 5 Time-Space Complexity; 6 Conclusion and Future Scope; References; Automated Trashcan; 1 Introduction; 2 Literature Survey; 3 Proposed Approach; 3.1 For Automatic Overflow Detection System.
متن يادداشت
3 Proposed Method3.1 Image Acquisition; 3.2 Converting the Videos into Frames by Frames; 3.3 Image Matching Technique Using SIFT and SURF; 4 Result and Discussion; 4.1 Setup; 4.2 Experiment; 4.3 Performance Evaluation Based on Execution Time; 5 Conclusion; References; A Survey on Cross-Layer Design Approach for Secure Wireless Sensor Networks; 1 Introduction; 2 Demand for Cross-Layer Design Approach; 3 A Scenario of Cross-Layer Design; 4 Comparative Study of Cross-Layer Protocols in WSN; 5 Challenges and Issues in Cross-Layer Design; 6 Performance Variations; 7 Conclusion; References.
متن يادداشت
Consumer Behavior Toward Mobile Phone Handsets1 Introduction; 2 Literature Review; 3 Objectives; 4 Research Gap; 5 Hypothesis; 6 Research Methodology; 7 Analysis and Interpretation; 8 Findings; 9 Conclusions; 10 Limitations; References; Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography; 1 Introduction; 2 Literature Review; 3 Proposed Work; 4 Proposed Algorithm; 5 Implementation Figures; 6 Conclusion and Future Work; References; A Decentralized Self-detection Mechanism to Defend Selfish Behavior in Spray and Wait Protocol; 1 Introduction.
متن يادداشت
Proof-of-Participation: Implementation of Proof-of-Stake Through Proof-of-Work1 Introduction; 2 Background; 2.1 Proof-Work (PoW); 2.2 Limitations of PoW; 2.3 Proof-of-Stake (PoS); 2.4 Limitations of PoS; 3 Proof-of-Participation Protocol; 4 Reward Distribution; 5 Discussion; 6 Conclusion; References; Unfolding the Mystery of Ransomware; 1 Introduction; 2 Background; 3 Process of Ransomware; 4 Prevention Techniques; 5 Conclusion and Future Work; References; IOT-Based Smart Museum Using Wearable Device; 1 Introduction; 1.1 Existing Methodologies; 1.2 Objective; 2 Literature Survey.
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
The book includes high-quality research papers presented at the International Conference on Innovative Computing and Communication (ICICC 2018), which was held at the Guru Nanak Institute of Management (GNIM), Delhi, India on 5-6 May 2018. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.
یادداشتهای مربوط به سفارشات
منبع سفارش / آدرس اشتراک
Springer Nature
شماره انبار
com.springer.onix.9789811323249
ویراست دیگر از اثر در قالب دیگر رسانه
عنوان
International Conference on Innovative Computing and Communications : Proceedings of ICICC 2018, Volume 1.