Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: Icacni 2015, Volume 2: Icacni 2015, Volume 2 by Atulya NagarProceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: Icacni 2015, Volume 2: Icacni 2015, Volume 2 by Atulya Nagar

Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics…

byAtulya NagarEditorDurga Prasad Mohapatra, Nabendu Chaki

Hardcover | September 14, 2015

Pricing and Purchase Info

$340.08 online 
$413.95 list price save 17%
Earn 1,700 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing amidst many others. This two volume proceedings explore the combined use of Advanced Computing and Informatics in the next generation wireless networks and security, signal and image processing, ontology and human-computer interfaces (HCI). The two volumes together include 132 scholarly articles, which have been accepted for presentation from over 550 submissions in the Third International Conference on Advanced Computing, Networking and Informatics, 2015, held in Bhubaneswar, India during June 23-25, 2015.
Prof. Atulya Nagar holds the Foundation Chair as Professor of Mathematical Sciences at Liverpool Hope University where he is the Dean of Faculty of Science. He has been the Head of Department of Mathematics and Computer Science since December 2007. A mathematician by training he is an internationally recognised scholar working at the c...
Title:Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics…Format:HardcoverDimensions:653 pagesPublished:September 14, 2015Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:8132225287

ISBN - 13:9788132225287

Look for similar items by category:


Table of Contents

Section A_Distributed Systems, Social Networks, and Applications : Chapter 1. An Algorithm for Partitioning Community Graph into Sub-Community Graphs Using Graph Mining Techniques.- Chapter 2. Traceback: A Forensic Tool for Distributed Systems.- Chapter 3. Deterministic Transport Protocol Verified by a Real-time Actuator and Sensor Network Simulation for Distributed Active Turbulent Flow Control.- Chapter 4. Improved Resource Provisioning in Hadoop.- Chapter 5. Cuckoo Search for Influence Maximization in Social networks.- Chapter 6. An Interactive System for Event Detection and Trend Analysis for Twitter Data.- Chapter 7. Design and Implementation of a Hierarchical Content Delivery Network Interconnection Model.- Section B_Networking systems and Architectures: Chapter 8. Solving Reliability Problems in Complex Networks with Approximated Cuts and Paths.- Chapter 9. Maximal Clique Size vs. Centrality: A Correlation Analysis for Complex Real World Network Graphs.- Chapter 10. On Solving the Multi-depot Vehicle Routing Problem.- Chapter 11. Prediction of Crop & Intrusions Using WSN.- Chapter 12. Ethernet MAC Verification by Efficient Verification Methodology for SOC Performance Improvement.- Chapter 13. MCDRR Packet Scheduling Algorithm for Multi-channel Wireless Networks.- Chapter 14. A Random Access Registration and Scheduling Based MAC Protocol with Directional Antennas for Improving Energy Efficiency.- Chapter 15. A Key Agreement Algorithm Based on ECDSA for Wireless Sensor Network.- Chapter 16. Frame Converter for Cooperative Coexistence between IEEE 802.15.4 Wireless Sensor Networks and WiFi.- Section C_Research on Wireless Sensor Networks, VANETs, and MANETs: Chapter 17. Secured Time Stable Geocast (S-TSG) Routing for VANETs.- Chapter 18. Reduction in Resource Consumption to Enhance Cooperation in MANET Using Compressive Sensing.- Chapter 19. AODV and ZRP Protocols Performance Study Using OPNET Simulator and EXata Emulator.- Chapter 20. Optimal Probabilistic Cluster Head Selection for Energy Efficiency in WSN.- Chapter 21. Firefly Algorithm Approach for Localization in Wireless Sensor Networks.- Chapter 22. Performance Analysis of Location and Distance Based Routing Protocols in VANET with IEEE802.- Chapter 23. Fuzzy based Analysis of Energy Efficient Protocols in Heterogeneous Wireless Sensor Networks.- Chapter 24. Node Application and Time based Fairness in Ad-hoc Networks: An Integrated Approach.- Chapter 25. Bee Colony Optimization for Data Aggregation in Wireless Sensor Networks.- Section D_Cryptography and Security Analysis: Chapter 26. Extended Visual Cryptography Scheme for Multi-Secret Sharing.- Chapter 27. Identifying HTTP DDoS Attacks Using Self Organizing Map and Fuzzy Logic in Internet based Environments.- Chapter 28. Improving the Visual Quality of (2,n) Random Grid Based Visual Secret Sharing Schemes.- Chapter 29. An Efficient Lossless Modulus Function Based Data Hiding Method.- Chapter 30. On the Use of Gaussian Integers in Public Key Cryptosystems.- Chapter 31. Stack Overflow based Defense for IPv6 Router Advertisement Flooding (DoS) Attack.- Chapter 32. Ideal Contrast Visual Cryptography for General Access Structures with AND Operation.- Chapter 33. Extending Attack Graph-based Metrics for Enterprise Network Security Management.- Chapter 34. A Graph-based Chameleon Signature Scheme.- Chapter 35. Design of ECSEPP: Elliptic Curve Based Secure E-Cash Payment Protocol.- Chapter 36. Security Improvement of One-Time Password Using Crypto-Biometric Model.- Chapter 37. An Image Encryption Technique Using Orthonormal Matrices and Chaotic Maps.- Chapter 38. Learning Probe Attack Patterns with Honeypots.- Section E_Operating System and Software Analysis: Chapter 39. Fuzzy Based Multilevel Feedback Queue Scheduler.- Chapter 40. Dynamic Slicing of Feature-Oriented Programs.- Chapter 41. Mathematical Model to Predict IO Performance Based on Drive Workload Parameters.- Chapter 42. Measure of Complexity for Object-Oriented Programs: A Cognitive Approach.- Chapter 43. Measurement of Semantic Similarity: A Concept Hierarchy Based Approach.- Chapter 44. Evaluating the Effectiveness of Conventional Fixes for SQL Injection Vulnerability.- Chapter 45. Salt and Pepper Noise Reduction Scheme Using Cellular Automata.- Section F_Internet, Web Technology, and Web Security: Chapter 46. Optimizing the Performance in Web Browsers through Data Compression: A study.- Chapter 47. Architectural Characterization of Web Service Interaction Verification.- Chapter 48. Revamping Optimal Cloud Storage System.- Chapter 49. Performance Improvement of MapReduce Framework by Identifying Slow TaskTrackers in Heterogeneous Hadoop Cluster.- Chapter 50. Router Framework for Secured Network Virtualization in Data Center of IaaS Cloud.- Chapter 51. Analysis of Machine Learning Techniques Based Intrusion Detection Systems.- Chapter 52. Compression and Optimization of Web-Contents.- Chapter 53. Harnessing Twitter for Automatic Sentiment Identification Using Machine Learning Techniques.- Section G_Big Data and Recommendation Systems: Chapter 54. Analysis and Synthesis for Archaeological Database Development in Nakhon Si Thammarat.- Chapter 55. Evaluation of Data Mining Strategies Using Fuzzy Clustering in Dynamic Environment.- Chapter 56. A Survey of Different Technologies and Recent Challenges of Big Data.- Chapter 57. Privacy Preserving Association Rule Mining in Horizontally Partitioned Databases without involving Trusted Third Party (TTP).- Chapter 58. Performance Efficiency and Effectiveness of Clustering Methods for Microarray Datasets.- Chapter 59. Data Anonymization through Slicing based on Graph-based Vertical Partitioning.- Chapter 60. An Efficient Approach for the Prediction of G-protein Coupled Receptors and their Subfamilies.- Section H_Fault and Delay Tolerant Systems: Chapter 61. Max-Util: A Utility-based Routing Algorithm For a Vehicular Delay Tolerant Network Using Historical Information.- Chapter 62. A Novel Approach for Real-Time Data Management in Wireless Sensor Network.- Chapter 63. Contact Frequency and Contact Duration Based Relay Selection Approach inside the Local Community in Social Delay Tolerant Network.- Section I_Satellite Communication, Antenna Research, and Cognitive Radio: Chapter 64. Optimal Structure Determination of Microstrip Patch Antenna for Satellite Communication.- Chapter 65. Multi-Metric Routing Protocol for Multi-Radio Wireless Mesh Networks.- Chapter 66. A Novel Dual Band Antenna for RADAR Application.