Skip to:ContentBottom
Cover image for Computer and Network Technology : Proceedings of the International Conference on ICCNT.
Computer and Network Technology : Proceedings of the International Conference on ICCNT.
Title:
Computer and Network Technology : Proceedings of the International Conference on ICCNT.
Author:
Mahadevan, V.
ISBN:
9789814289771
Personal Author:
Physical Description:
1 online resource (375 pages)
Contents:
Contents -- Organizing Committee -- Technical Committee -- Preface -- Session 1 -- Analysis of a Mathematical Model for Worm Virus Propagation S.-I. Wang, C. Liang and Q.-M. Liu -- 1. Introduction -- 2. Mathematical Modeling -- 3. Simulation -- 4. Conclusion -- References -- SABAD: Self Assured Black-hole Attack Detection on AODV Protocol in MANET K. S. Chaudhary, S. Tripathy and K. V. Arya -- 1. Introduction -- 2. Network Assumption -- 3. SABAD: The proposed mechanism -- 3.1. Neighborhood data collection -- 3.2. Trust Value calculation -- 3.3. Route discovery -- 3.4. Alarm Phase -- 3.5. Route Maintenance -- 4. Parameter Prediction -- 4.1 Estimation of Battery Energy -- 4.2. Prediction of Signal Strength -- 4.4. Prediction of Node Mobility -- 5. Discussion -- 6. Conclusion -- References -- LIC-based Fast Forwarding towards Scalability, Simplicity, Flexibility and Security K. Xiong, Z.-D. Qiu, Y. Zhang, Y.-c. Guo and H-K. Zhang -- 1. Introduction -- 2. Related Work -- 3. LIe-based Forwarding -- 3.1. OLIC-based Forwarding -- 3.2. TUe-based forwarding -- 4. Analysis of Lie-Based Forwarding -- 5. Experiment Results -- 6. Conclusion -- Acknowledgments -- References -- Push Technology with Location Tracking & Data Filtering for Wireless C. P. Reddy, K. Prakhya and T. R. Rao -- I. INTRODUCTION -- II. ELATED WORK -- IV. IMPLEMENTATION -- V. RESULTS & ANALYSIS -- VI. CONCLUSIONS -- ACKNOWLEDGEMENT -- REFERENCES -- Dynamic Speed Response of the Internal Model Controller with Dither Injection N. Amuthan, R. Mohan and N. Sivakumar -- 1. Introduction -- 2. Internal model controller -- 2.1. Controller design -- 3. Dynamic speed response -- 4. Dither injection -- 5. Conclusiou -- Acknowledgment -- References -- Biographics -- An Ownership Sharing Protocol for RFID without a Trusted Third Party G. Kapoor and S. Piramuthu -- 1. Introduction.

2. The Proposed Ownership Sharing Protocol -- 2.1. Notation -- 3. Security Analysis -- 3.1. Secrecy/Authentication -- 3.2. DoS/Synchronization problem -- 3.3. Forward Security -- 3.4. Passive ReplaylTracking -- 4. Discussion -- References -- Queuing Analysis of IEEE 802.11 WLAN O. Bhat, N. S. Shankar and K. Venkataramaniah -- 1. Introduction -- 2. Mathematical Model of Backoff Process -- 3. Queuing Model for Individual WSTA -- 4. Numerical Results -- 5. Conclusions -- Acknowledgments -- References -- A Localization Algorithm for a GPS-Free System with Static Parameter Tuning K. Padia, G. A. Vikas, H S. lyer, V. R. Darshan, N. P. G. Prasad, A. Srinivas, H Khan, A. Gupta and S. Olariu -- 1. Introduction -- 2. Related Work -- 3. Prediction-Interpolation with Static Parameter Tuning -- 4. Implementation and Results -- 5. Future Work -- References -- Session 2 -- HELLO Expired Time Based Greedy Routing Scheme for Mobile Ad Hoc Networks S. Sharma -- 1. Introduction -- 2. Background -- 2.1. Geographical Routing -- 2.2. Research on HELLO protocol -- 3. Analysis on HELLO Protocol -- 4. Our Methodology -- 4.1. Our Proposed Metric -- 4.2. Metric for Greedy Routing -- 4.3. Modified Greedy Routing -- 5. Simulation Environment -- 6. Analysis of Results -- 7. Conclusions and Future Work -- Acknowledgments -- References -- A Role Based Trust Model for Peer to Peer Systems C. Selva raj and S. Anand -- 1. Introduction -- 2. Related Work -- 3. Our Approach -- 3.1 Credential Chain Construction using RT Framework -- 3.2 Conclusions from Clo,sure Properties -- 4. Implementation -- 5. System Architecture -- 5.1 Peer Group Generation -- 6. Conclusion -- References -- Internetworking Interface Function for Charging and Billing in IP Telephony Services C. Chakraborty, P. S. Chakraborty, S. S. Pathak and S. Chakrabarti -- 1. Introduction.

2. Internetworking of Heterogeneous Networks -- 3. Overview of Session Initiation Protocol (SIP) -- 3.1. Network Architecture -- 3.2. Signaling -- 4. Basic Architecture of SS7 Signaling -- 5. Call Flow Representation with Charging and Metering -- 5.1. Call Flow between ISUP to SIP -- 5.2. Call Flow between SIP to ISUP -- 6. Flow Chart -- 7. Charging in IP Telephony Services -- 8. Accounting and Billing in IP Telephony Services -- 9. Conclusion -- Acknowledgement -- References -- Optimized Route Request Algorithms for On Demand Multicast Routing Protocol B. Venkatalakshmi, C. Dhivya and G. layachandran -- 1. Introduction -- 1.1. Producing Hard Copy Using MS-Word -- 2. Background -- 3. Proposed Algorithms -- 3.1. Algorithm 1: Static Threshold -- 3.2. Algorithm 2: Dynamic Threshold -- 3.3. Algorithm 3: Converting members as nonmembers -- 4. RESULTS -- 4.1. All"Yorithim 1: Static Threshold -- 4.2. Algorithm 2: Dynamic Threshold -- 4.3. Algorithm 3: couverting members as nonmembers -- 5. Conclusion -- References -- A Class of Cayley Graph Interconnection Networks based on Rosenbloom-Tsfasman Metric W B. Vasantha and R. Rajkumar -- 1. Introduction -- 2. Preliminaries -- 3. Cayley graphs of Z -- : based on RT metric -- 3.1. A simple routing algorithm for C (z: -- , S D) -- 4. Cayley graphs of Sn based on RT metric -- 5. Conclusions -- References -- Research on the Framework of Networking Simulation Training System L. Luo and Y. Gao -- 1. Introduction -- 2. Analysis of the Substratum Framework in Traditional Simulation Training Systems -- 3. Two Kinds of Simulation Training System Framework Based on Networking Simulation -- 4. A Distributed Embed Networking Simulation Training System Framework -- 5. Conclusion -- References -- Combined Approach of Service and Route Discovery in Mobile Ad Hoc Networks K. Modi and K. Singh -- 1. Introduction.

2. Service Discovery protocols for MANETs -- 3. Integrated Approach for Service and Route Discovery -- 3.1. Service Specification -- 3.2. Service Binding -- 3.3. Service Table -- 3.4. Combined Service and Route Discovery -- 3.5. Message Formats -- 4. Integration of Service Discovery with AODV -- 4.1. Modifications to Internet-Draft Specification -- 5. Integration of Service Discovery with DSR -- 5.1. Service Table -- 5.2. Service Timer -- 6. Simulation -- 6.1. Simulation Setup -- 7. Conclusions and Future work -- References -- Advanced Link State Protocol K. Prabhakaran -- 1. Introduction -- 1.1. Problem IJeti.nitioln -- 1.2. The Impact of Poisonong -- 2. Routing Table Poisoning Attacks -- 2.1. Modification/Fabrication -- 2.2. Insertion -- 2.3. Deletion -- 2.4. Routing Protocols -- 3. Link State Routing Protocol -- 3.1. Faulty Source -- 3.2. Faulty Intermediate Router -- 4. Solution -- 4.1. Proposed Protocol -- 4.2. Cryptographic Technique -- 4.3. Shared key architecture for routing protocols -- 4.4. Shared Key Management for Routing Protocols -- 4.5. Digital Signature Authentication for OSPF -- 4.6. Proposals for the authentication scheme for·OSPF -- 5. Sequencing of Router Dates -- 5.1. Authentication and Key Management -- 5.2. Comparing With Neighbors Information with Double Authentication -- 5.3. Proposed Header for the LSA Transmission -- 6. Algorithm -- 6.1. Transmitting -- 6.2. Receiving -- 6.3. New Member Added -- 6.4. Transmit the generated key to all the members encrypted with the old shared key -- 6.5. Member Exit -- 7. Algorithms that are best suited for this protocol -- 7.1. For the digital signatures the algorithms used are -- 7.2. Key management -- 7.3. Check sum -- 8. Implementation Issues -- Acknowledgments -- References -- Session 3 -- Improving Basic Cases of Data Mining H. Samavarchi, M. R. Dehghani and H. Ghasemzadeh -- Abstract.

1. Introduction -- References -- High-Performance FPGA Implementation of Compact Single Round AES Design V. Patel, R. C. Joshi and A. K. Saxena -- 1. Introduction -- 2. AES Algorithm -- 3. Single Round AES Architecture -- 3.1. Round Unit -- 3.2. Key Scheduler Unit -- 3.3. Control Unit -- 4. Composite Field Arithmetic based SubBytes function -- 5. Implementation Resnlts -- 6. Performance Comparison with other Designs -- 7. Conclusion -- References -- Secure Protocol for Delivery of SMS Banking Services S. S. Ahmeda and A. M. A. Edwila -- 1. Introduction -- 2. ID-Based Elliptic Curve Cryptography -- 3. Secure SMS Protocol Based On ID-Based Cryptography -- 4. Results -- CONCLUSION -- REFERENCES -- The Application of Automatic Monitoring System for Electrostatic Precipitator K. Wu, Y. Zheng and Y. Ma -- 1. Introduction -- 2. Theory -- 2.1. The design of operating station -- 2.2. Data Communication -- 2.3. Closed loop control -- 2.4. Online detecting removal efficiency -- 3. Results -- 3.1. The realization of data acquisition -- 3.2. The design of operating interface -- 3.3. Data reporl junction -- 3.4. Key technology -- 4. Conclusions -- References -- Key Establishment and Management Scheme for Mobile Sensor Nodes in a Limited Geographic Region N. Shah -- 1. Introduction -- 2. Related Work -- 3. Key Establishment and Management Scheme for Mobile Sensor Nodes in a Limited Geographic Region -- 3.1. ML scheme -- 3.2. Assumptions -- 3.3. Key pre-distribution -- 3.4. Shared key discovery -- 3.5. Sharing of secret key for communication -- 3.6. Key re-establishment -- 3.7. Communication scenarios -- 4. Performance Analysis of Proposed Scheme -- 4.1. Connectivity -- 4.2. Scalability -- 4.3. Resilience -- 4.4. Node authentication -- 4.5. Restricting node replication -- 4.6. Performance evaluation -- 5. Conclusion -- References.

EPR Data Hiding in Medical Images with Integrity Checking S. Dhavale, S. Mali and R. Jalnekar.
Abstract:
ICCNT is the main annual computer and network research conference in Chennai that presents cutting edge research work. It will act as a platform for scientists, scholars, engineers and students from universities all around the world to present ongoing research and hence foster better research relations between universities and the computer and networking industry. Sample Chapter(s). Chapter 1: Analysis of a Mathematical Model for Worm Virus Propagation (174 KB). Contents: Analysis of a Mathematical Model for Worm Virus Propagation (S-J Wang et al.); Research on the Framework of Networking Simulation Training System (L Luo & Y Gao); EPR Data Hiding in Medical Images with Integrity Checking (S Dhavale et al.); Swarm Formation in a Multi-Swarm Network Centric Warfare (P Lalbakhsh et al.); A Radix-2 2 Pipeline FFT for Ultra Wide Band Technology (K Harikrishna et al.); Detection of Faces and Facial Features in Color Images (A H Sable & K C Jondhale); Networks for NCW: Concepts and Issues (D K Sunil); Adaptive Service Coordinator Election in MANET (J Cynthia & V Sumathy); Turn-on Time Delay of Degraded Bulk Uncooled Semiconductor Laser Diodes (M S Ab-Rahman & M R Hassan); and other papers. Readership: Scientists, scholars, engineers and students in the computer networking field.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: