000781966 000__ 05131cam\a2200565Ii\4500 000781966 001__ 781966 000781966 005__ 20230306143229.0 000781966 006__ m\\\\\o\\d\\\\\\\\ 000781966 007__ cr\cn\nnnunnun 000781966 008__ 170505s2017\\\\si\a\\\\o\\\\\101\0\eng\d 000781966 019__ $$a986545450$$a986883003 000781966 020__ $$a9789811032264$$q(electronic book) 000781966 020__ $$a9811032262$$q(electronic book) 000781966 020__ $$z9789811032257 000781966 020__ $$z9811032254 000781966 035__ $$aSP(OCoLC)ocn985702621 000781966 035__ $$aSP(OCoLC)985702621$$z(OCoLC)986545450$$z(OCoLC)986883003 000781966 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dEBLCP$$dN$T$$dYDX$$dOCLCF$$dUAB 000781966 049__ $$aISEA 000781966 050_4 $$aTK5105.5 000781966 08204 $$a004.6$$223 000781966 1112_ $$aInternational Conference on Computer and Communication Technologies$$n(3rd :$$d2016 :$$cVijayawāda, India) 000781966 24510 $$aComputer communication, networking and internet security :$$bproceedings of IC3T 2016 /$$cSuresh Chandra Satapathy, Vikrant Bhateja, K. Sruhan Raju, B. Janakiramaiah, editors. 000781966 2463_ $$aIC3T 2016 000781966 264_1 $$aSingapore :$$bSpringer,$$c2017. 000781966 300__ $$a1 online resource (xxxi, 623 pages) :$$billustrations. 000781966 336__ $$atext$$btxt$$2rdacontent 000781966 337__ $$acomputer$$bc$$2rdamedia 000781966 338__ $$aonline resource$$bcr$$2rdacarrier 000781966 4901_ $$aLecture notes in networks and systems,$$x2367-3370 ;$$vvolume 5 000781966 500__ $$aIncludes author index. 000781966 5050_ $$aPreface; Organising Committee; Patrons; Organising Committee; Local Organising Committee; Contents; Editors and Contributors; 1 Approach Towards Increasing Efficiency of Communication Protocol in Wireless Sensor Network Using Modified Routing Protocol; Abstract; 1 Introduction; 2 Related Work; 3 Neural LEACH and M-Gear; 4 M-Gear; 5 Test Results and Comparison; 6 Conclusion; References; 2 Anomaly Detection System in a Cluster Based MANET; Abstract; 1 Introduction; 2 Related Work; 3 AODV (Adhoc On-Demand Distance Vector); 4 The Proposed Method; 5 Experimental Results; 5.1 Simulation Scenario 000781966 5058_ $$a5.2 Summary of Results6 Conclusions; References; 3 Temperature Data Transfer Using Visible Light Communication; Abstract; 1 Introduction; 2 Related Works; 3 Proposed Temperature Data Transfer Using VLC System; 3.1 Temperature Sensing and VLC Transmitting Procedure; 3.2 LOS Channel Model; 3.3 VLC Receiving Procedure; 4 Experimental Testing and Results Discussion; 4.1 Room Temperature Data Transmission Using VLC; 4.1.1 First Test; 4.1.2 Second Test; 4.1.3 Third Test; 4.2 Body Temperature Monitoring and Data Transmission Using VLC; 5 Conclusion and Future Work; References 000781966 5058_ $$a4 A New Approach for Data Security in Cryptography and SteganographyAbstract; 1 Introduction; 2 Proposed Method; 2.1 Encoding Message; 2.2 Hiding the Encoded Message into an Image; 3 Results and Discussion; 3.1 At Sender Side; 3.2 At Receiver Side; 3.3 Avalanche Effect; 4 Conclusion; References; 5 Improvement of Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network; Abstract; 1 Introduction; 2 Related Work; 3 Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Network; 4 Proposed Protocol; 5 Simulation and Analysis 000781966 5058_ $$a6 Conclusion and Future ScopeReferences; 6 Computational and Emotional Linguistic Distance and Language Learning; Abstract; 1 Introduction; 2 Linguistic Distance; 3 Computational Linguistics; 3.1 Approaches to Computational Linguistics; 3.2 Speech Recognition Systems; 4 Computational Linguistic Distance; References; 7 Collaborative Attack Effect Against Table-Driven Routing Protocols for WANETs: A Performance Analysis; Abstract; 1 Introduction; 2 Related Work; 3 Overview of Routing Protocols; 3.1 Proactive Routing Protocols; 3.1.1 Destination-Sequenced Distance-Vector (DSDV) Routing Protocol 000781966 5058_ $$a3.1.2 Optimized Link State Routing (OLSR) Routing Protocol3.2 Performance Assessment of Proactive Routing Protocols; 3.2.1 Assessment of DSDV and OLSR Routing Protocol; 4 Modelling Collaborative Attack Against Adhoc Routing Protocols; 5 Simulation Results and Performance Analysis; 6 Conclusion and Future Work; References; 8 Body Biased High Speed Full Adder to LNCS/LNAI/LNBI Proceedings; Abstract; 1 Introduction; 2 Literature Survey; 2.1 CCMOS 28 Transistor Full Adder; 2.2 GDI Full Adder; 2.3 MG-GDI Full Adder; 2.4 Low Power High Speed Hybrid Full Adder; 2.5 High Speed GLBB Technique 000781966 506__ $$aAccess limited to authorized users. 000781966 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 12, 2017). 000781966 650_0 $$aComputer networks$$vCongresses. 000781966 650_0 $$aTelecommunication systems$$vCongresses. 000781966 7001_ $$aSatapathy, Suresh Chandra,$$d1964-$$eeditor. 000781966 7001_ $$aBhateja, Vikrant,$$eeditor. 000781966 7001_ $$aRaju, K. Srujan,$$eeditor. 000781966 7001_ $$aJanakiramaiah, B.,$$eeditor. 000781966 77608 $$iPrint version:$$z9811032254$$z9789811032257$$w(OCoLC)961415283 000781966 830_0 $$aLecture notes in networks and systems ;$$vv. 5. 000781966 852__ $$bebk 000781966 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-3226-4$$zOnline Access$$91397441.1 000781966 909CO $$ooai:library.usi.edu:781966$$pGLOBAL_SET 000781966 980__ $$aEBOOK 000781966 980__ $$aBIB 000781966 982__ $$aEbook 000781966 983__ $$aOnline 000781966 994__ $$a92$$bISE