000796184 000__ 05450cam\a2200553Ki\4500 000796184 001__ 796184 000796184 005__ 20230306143354.0 000796184 006__ m\\\\\o\\d\\\\\\\\ 000796184 007__ cr\un\nnnunnun 000796184 008__ 170711s2017\\\\si\a\\\\o\\\\\101\0\eng\d 000796184 019__ $$a992988841$$a993652460 000796184 020__ $$a9789811039355$$q(electronic book) 000796184 020__ $$a9811039356$$q(electronic book) 000796184 020__ $$z9789811039348 000796184 020__ $$z9811039348 000796184 035__ $$aSP(OCoLC)ocn993448501 000796184 035__ $$aSP(OCoLC)993448501$$z(OCoLC)992988841$$z(OCoLC)993652460 000796184 040__ $$aYDX$$beng$$cYDX$$dN$T$$dGW5XE$$dEBLCP$$dN$T$$dOCLCF$$dNJR$$dUAB 000796184 049__ $$aISEA 000796184 050_4 $$aTK5105.5 000796184 08204 $$a004.6$$223 000796184 1112_ $$aInternational Symposium on Computing and Network Sustainability$$d(2016 :$$cVelha Goa, India). 000796184 24510 $$aComputing and network sustainability$$h[electronic resource] :$$bproceedings of IRSCNS 2016 /$$cH.R . Vishwakarma, Shyam Akashe, editors. 000796184 2463_ $$aIRSCNS 2016 000796184 260__ $$aSingapore :$$bSpringer,$$cc2017. 000796184 300__ $$a1 online resource :$$bill. 000796184 336__ $$atext$$btxt$$2rdacontent 000796184 337__ $$acomputer$$bc$$2rdamedia 000796184 338__ $$aonline resource$$bcr$$2rdacarrier 000796184 4901_ $$aLecture notes in networks and systems,$$x2367-3370 ;$$vv. 12 000796184 500__ $$aIncludes author index. 000796184 5050_ $$aPreface; Conference Organizing Committee; Advisory Committee; Organizing Committee; Program Committee; Contents; Editors and Contributors; 1 Trust Model for Secure Routing and Localizing Malicious Attackers in WSN; Abstract; 1 Introduction; 1.1 Conceptual Diagram; 2 Paper Organization; 3 Objective; 4 Scope of the Work; 5 Proposed Work; 6 Result and Analysis; 7 Conclusion; References; 2 Probabilistic Analysis of Performance Measures of Redundant Systems Under Weibull Failure and Repair Laws; Abstract; 1 Introduction; 2 System Model Description, Notations and States of the Model; 3 Notations 000796184 5058_ $$a4 Various Transition States of the System Models5 Transition Probabilities; 6 Mean Sojourn Times; 7 Reliability Measures; 7.1 Mean Time to System Failure; 7.2 Availability Analysis; 7.3 Some Other Reliability Characteristics; 8 Profit Analysis; 8.1 Comparative Study; 9 Graphical Results; References; 3 Blockage With in Wi-Fi Sensor Networks in Addition to Systems Regarding Controlling Congestion; Abstract; 1 Introduction; 2 Bottlenecks in Wireless Sensor Networks; 3 Types of Blockages in Wireless Systems; 4 Review of Congestion Control Protocols in Wireless Sensor Networks 000796184 5058_ $$a4.1 Clog Avoidance and Detection4.2 Fairness Aware Congestion Control; 4.3 Versatile Rate Control; 4.4 SenTCP; 4.5 Reasonable Awareness Congestion Control; 4.6 Priority-Based Congestion Control Protocol (PCCP); 4.7 Stream; 4.8 Siphon; 4.9 Prioritized Heterogeneous Traffic-Oriented Congestion Control Protocol (PHTCCP); 4.10 Learning Automata-Based Congestion Avoidance Algorithm in Sensor Networks (LACAS); 5 Conclusion; References; 4 Privacy Preserving Using Video Encryption Technique-the Hybrid Approach; Abstract; 1 Introduction; 2 Cryptography Information 000796184 5058_ $$a3 Video Encryption Algorithm Approach4 Proposed Methodology for Video Encryption; 5 Pros and Cons of Proposed Methodology; 6 Simulation Study; 7 Conclusion; References; 5 Performance Analysis of Improved AODV Routing Protocol in Mobile Ad hoc Network; Abstract; 1 Introduction; 2 Proposed Idea Description; 3 Simulation Model; 4 Conclusion; References; 6 Slots Loaded Multilayered Circular Patch Antenna for Wi-Fi/WLAN Applications; Abstract; 1 Introduction; 2 Antenna Design; 3 Result and Discussion; 4 Conclusions; References 000796184 5058_ $$a7 Triggering a Functional Electrical Stimulator Based on Gesture for Stroke-Induced Movement DisorderAbstract; 1 Introduction; 2 Experimental Setup; 2.1 Electromyography; 2.2 Attitude Estimate; 2.3 Trigger Mechanism; 3 Results; 4 Conclusion; References; 8 Academic Dashboard-Prediction of Institutional Student Dropout Numbers Using a Naïve Bayesian Algorithm; Abstract; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Survey Form During Student Admission; 3.2 Survey Form for the Middle of Term; 3.3 Work Methodology; 3.4 Predictions of Dropping Out; 4 Research Ethics; 5 Experimental Results 000796184 506__ $$aAccess limited to authorized users. 000796184 520__ $$aThe book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works. 000796184 588__ $$aDescription based on print version record. 000796184 650_0 $$aComputer networks$$vCongresses. 000796184 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000796184 7001_ $$aVishwakarma, H. R.,$$d1960-$$eeditor. 000796184 7001_ $$aAkashe, Shyam,$$eeditor. 000796184 77608 $$iPrint version:$$z9789811039348$$z9811039348$$w(OCoLC)969829492 000796184 830_0 $$aLecture notes in networks and systems ;$$vv. 12. 000796184 852__ $$bebk 000796184 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-3935-5$$zOnline Access$$91397441.1 000796184 909CO $$ooai:library.usi.edu:796184$$pGLOBAL_SET 000796184 980__ $$aEBOOK 000796184 980__ $$aBIB 000796184 982__ $$aEbook 000796184 983__ $$aOnline 000796184 994__ $$a92$$bISE