Linked e-resources
Details
Table of Contents
Preface; Conference Organizing Committee; Advisory Committee; Organizing Committee; Program Committee; Contents; Editors and Contributors; 1 Trust Model for Secure Routing and Localizing Malicious Attackers in WSN; Abstract; 1 Introduction; 1.1 Conceptual Diagram; 2 Paper Organization; 3 Objective; 4 Scope of the Work; 5 Proposed Work; 6 Result and Analysis; 7 Conclusion; References; 2 Probabilistic Analysis of Performance Measures of Redundant Systems Under Weibull Failure and Repair Laws; Abstract; 1 Introduction; 2 System Model Description, Notations and States of the Model; 3 Notations
4 Various Transition States of the System Models5 Transition Probabilities; 6 Mean Sojourn Times; 7 Reliability Measures; 7.1 Mean Time to System Failure; 7.2 Availability Analysis; 7.3 Some Other Reliability Characteristics; 8 Profit Analysis; 8.1 Comparative Study; 9 Graphical Results; References; 3 Blockage With in Wi-Fi Sensor Networks in Addition to Systems Regarding Controlling Congestion; Abstract; 1 Introduction; 2 Bottlenecks in Wireless Sensor Networks; 3 Types of Blockages in Wireless Systems; 4 Review of Congestion Control Protocols in Wireless Sensor Networks
4.1 Clog Avoidance and Detection4.2 Fairness Aware Congestion Control; 4.3 Versatile Rate Control; 4.4 SenTCP; 4.5 Reasonable Awareness Congestion Control; 4.6 Priority-Based Congestion Control Protocol (PCCP); 4.7 Stream; 4.8 Siphon; 4.9 Prioritized Heterogeneous Traffic-Oriented Congestion Control Protocol (PHTCCP); 4.10 Learning Automata-Based Congestion Avoidance Algorithm in Sensor Networks (LACAS); 5 Conclusion; References; 4 Privacy Preserving Using Video Encryption Technique-the Hybrid Approach; Abstract; 1 Introduction; 2 Cryptography Information
3 Video Encryption Algorithm Approach4 Proposed Methodology for Video Encryption; 5 Pros and Cons of Proposed Methodology; 6 Simulation Study; 7 Conclusion; References; 5 Performance Analysis of Improved AODV Routing Protocol in Mobile Ad hoc Network; Abstract; 1 Introduction; 2 Proposed Idea Description; 3 Simulation Model; 4 Conclusion; References; 6 Slots Loaded Multilayered Circular Patch Antenna for Wi-Fi/WLAN Applications; Abstract; 1 Introduction; 2 Antenna Design; 3 Result and Discussion; 4 Conclusions; References
7 Triggering a Functional Electrical Stimulator Based on Gesture for Stroke-Induced Movement DisorderAbstract; 1 Introduction; 2 Experimental Setup; 2.1 Electromyography; 2.2 Attitude Estimate; 2.3 Trigger Mechanism; 3 Results; 4 Conclusion; References; 8 Academic Dashboard-Prediction of Institutional Student Dropout Numbers Using a Naïve Bayesian Algorithm; Abstract; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Survey Form During Student Admission; 3.2 Survey Form for the Middle of Term; 3.3 Work Methodology; 3.4 Predictions of Dropping Out; 4 Research Ethics; 5 Experimental Results
4 Various Transition States of the System Models5 Transition Probabilities; 6 Mean Sojourn Times; 7 Reliability Measures; 7.1 Mean Time to System Failure; 7.2 Availability Analysis; 7.3 Some Other Reliability Characteristics; 8 Profit Analysis; 8.1 Comparative Study; 9 Graphical Results; References; 3 Blockage With in Wi-Fi Sensor Networks in Addition to Systems Regarding Controlling Congestion; Abstract; 1 Introduction; 2 Bottlenecks in Wireless Sensor Networks; 3 Types of Blockages in Wireless Systems; 4 Review of Congestion Control Protocols in Wireless Sensor Networks
4.1 Clog Avoidance and Detection4.2 Fairness Aware Congestion Control; 4.3 Versatile Rate Control; 4.4 SenTCP; 4.5 Reasonable Awareness Congestion Control; 4.6 Priority-Based Congestion Control Protocol (PCCP); 4.7 Stream; 4.8 Siphon; 4.9 Prioritized Heterogeneous Traffic-Oriented Congestion Control Protocol (PHTCCP); 4.10 Learning Automata-Based Congestion Avoidance Algorithm in Sensor Networks (LACAS); 5 Conclusion; References; 4 Privacy Preserving Using Video Encryption Technique-the Hybrid Approach; Abstract; 1 Introduction; 2 Cryptography Information
3 Video Encryption Algorithm Approach4 Proposed Methodology for Video Encryption; 5 Pros and Cons of Proposed Methodology; 6 Simulation Study; 7 Conclusion; References; 5 Performance Analysis of Improved AODV Routing Protocol in Mobile Ad hoc Network; Abstract; 1 Introduction; 2 Proposed Idea Description; 3 Simulation Model; 4 Conclusion; References; 6 Slots Loaded Multilayered Circular Patch Antenna for Wi-Fi/WLAN Applications; Abstract; 1 Introduction; 2 Antenna Design; 3 Result and Discussion; 4 Conclusions; References
7 Triggering a Functional Electrical Stimulator Based on Gesture for Stroke-Induced Movement DisorderAbstract; 1 Introduction; 2 Experimental Setup; 2.1 Electromyography; 2.2 Attitude Estimate; 2.3 Trigger Mechanism; 3 Results; 4 Conclusion; References; 8 Academic Dashboard-Prediction of Institutional Student Dropout Numbers Using a Naïve Bayesian Algorithm; Abstract; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Survey Form During Student Admission; 3.2 Survey Form for the Middle of Term; 3.3 Work Methodology; 3.4 Predictions of Dropping Out; 4 Research Ethics; 5 Experimental Results