Novel Algorithms and Techniques in Telecommunications and Networking

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Novel Algorithms and Techniques in Telecommunications and Networking includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Industrial Electronics, Technology & Automation, Telecommunications and Networking.

Novel Algorithms and Techniques in Telecommunications and Networking includes selected papers form the conference proceedings of the International Conference on Telecommunications and Networking (TeNe 08) which was part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2008).

Topics Covered:

  • Computer Networks: Access Technologies, Medium Access Control, Network architectures and Equipment, Optical Networks and Switching, Telecommunication Technology, and Ultra Wideband Communications.

  • Coding and Modulation: Modeling and Simulation, OFDM technology , Space-time Coding, Spread Spectrum and CDMA Systems.

  • Wireless technologies: Bluetooth , Cellular Wireless Networks, Cordless Systems and Wireless Local Loop, HIPERLAN, IEEE 802.11, Mobile Network Layer, Mobile Transport Layer, and Spread Spectrum.

  • Network Security and applications: Authentication Applications, Block Ciphers Design Principles, Block Ciphers Modes of Operation, Electronic Mail Security, Encryption & Message Confidentiality, Firewalls, IP Security, Key Cryptography & Message Authentication, and Web Security.

  • New trends in Automation and Communications: Biometric Authentication, Computer Forensics, Machine Vision, MEMS Sensors, Stenography, and Support for Mobility.

Author(s): Michael Sauer (auth.), Tarek Sobh, Khaled Elleithy, Ausif Mahmood (eds.)
Edition: 1
Publisher: Springer Netherlands
Year: 2010

Language: English
Pages: 517
Tags: Communications Engineering, Networks; Computer Communication Networks

Front Matter....Pages i-xv
IP Application Test Framework....Pages 1-7
Cross-Layer Based Approach to Detect Idle Channels and Allocate Them Efficiently Using Markov Models....Pages 9-15
Threshold Based Call Admission Control for QoS Provisioning in Cellular Wireless Networks with Spectrum Renting....Pages 17-22
Ontology-Based Web Application Testing....Pages 23-27
Preventing the “Worst Case Scenario:” Combating the Lost Laptop Epidemic with RFID Technology....Pages 29-33
Information Security and System Development....Pages 35-40
A Survey of Wireless Sensor Network Interconnection to External Networks....Pages 41-46
Comparing the Performance of UMTS and Mobile WiMAX Convolutional Turbo Code....Pages 47-51
Performance of Interleaved Cipher Block Chaining in CCMP....Pages 53-58
Localization and Frequency of Packet Retransmission as Criteria for Successful Message Propagation in Vehicular Ad Hoc Networks....Pages 59-64
Authentication Information Alignment for Cross-Domain Federations....Pages 65-70
Formally Specifying Linux Protection....Pages 71-79
Path Failure Effects on Video Quality in Multihomed Environments....Pages 81-86
Reconfigurable Implementation of Karatsuba Multiplier for Galois Field in Elliptic Curves....Pages 87-92
Nonlinear Congestion Control Scheme for Time Delayed Differentiated-Services Networks....Pages 93-97
Effect of Packet Size and Channel Capacity on the performance of EADARP Routing Protocol for Multicast Wireless ad hoc Networks....Pages 99-104
Improving BGP Convergence Time via MRAI Timer....Pages 105-110
Error Reduction using TCP with Selective Acknowledgement and HTTP with Page Response Time over Wireless Link....Pages 111-116
Enhanced Reconfigurability for MIMO Systems using Parametric Arrays....Pages 117-122
Modified LEACH – Energy Efficient Wireless Networks Communication....Pages 123-127
Intrusion Detection and Classification of Attacks in High-Level Network Protocols Using Recurrent Neural Networks....Pages 129-134
Automatic Construction and Optimization of Layered Network Attack Graph....Pages 135-138
Parallel Data Transmission: A Proposed Multilayered Reference Model....Pages 139-142
Besides Tracking – Simulation of RFID Marketing and Beyond....Pages 143-148
Light Path Provisioning using Connection Holding Time and Flexible Window....Pages 149-154
Distributed Hybrid Research Network Operations Framework....Pages 155-160
Performance of the Duo-Binary Turbo Codes in WiMAX Systems....Pages 161-165
A unified event reporting solution for wireless sensor networks....Pages 167-172
A Low Computational Complexity Multiple Description Image Coding Algorithm Based on JPEG Standard....Pages 173-176
A General Method for Synthesis of Uniform Sequences with Perfect Periodic Autocorrelation....Pages 177-182
Using Support Vector Machines for Passive Steady State RF Fingerprinting....Pages 183-188
Genetic Optimization for Optimum 3G Network Planning: an Agent-Based Parallel Implementation....Pages 189-194
A Survey about IEEE 802.11e for better QoS in WLANs....Pages 195-200
Method of a Signal Analysis for Imitation Modeling in a Real-Time Network....Pages 201-206
Simple yet efficient NMEA sentence generator for testing GPS reception firmware and hardware.....Pages 207-210
Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks....Pages 211-216
Modeling Trust in Wireless Ad-Hoc Networks....Pages 217-221
Address Management in MANETs Using an Ant Colony Metaphor....Pages 223-228
Elitism Between Populations for the Improvement of the Fitness of a Genetic Algorithm Solution....Pages 229-233
Adaptive Genetic Algorithm for Neural Network Retraining....Pages 235-238
A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks....Pages 239-244
A Dynamic Scheme for Authenticated Group Key Agreement Protocol....Pages 245-250
Performance Evaluation of TCP Congestion Control Mechanisms....Pages 251-256
Optimization and Job Scheduling in Heterogeneous Networks....Pages 257-262
A New Methodology for Self Localization in Wireless Sensor Networks....Pages 263-268
A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)....Pages 269-274
A New Analytical Model for Maximizing the Capacity and Minimizing the Transmission Delay for MANET....Pages 275-279
Faulty Links Optimization for Hypercube Networks via Stored and Forward One-Bit Round Robin Routing Algorithm....Pages 281-286
Improving the Data Rate in Wireless Mesh Networks Using Orthogonal Frequency Code Division (OFCD)....Pages 287-292
A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution....Pages 293-298
A Mathematical Model for Reducing Handover Time at MAC Layer for Wireless Networks....Pages 299-304
A Software Solution for Mobile Context Handoff in WLANs * ....Pages 305-309
Robust Transmission of Video Stream over Fading Channels....Pages 311-316
An Attack Classification Tool Based On Traffic Properties and Machine Learning....Pages 317-321
Browser based Communications Integration using Representational State Transfer....Pages 323-328
Security Aspects of Internet based Voting....Pages 329-332
Middleware-based distributed heterogeneous simulation....Pages 333-337
Analysis of the flooding search algorithm with OPNET....Pages 339-342
Efficient Self-Localization and Data Gathering Architecture for Wireless Sensor Networks....Pages 343-348
Two Cross-Coupled H∞ Filters for Fading Channel Estimation in OFDM Systems....Pages 349-353
An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks....Pages 355-360
A highly parallel scheduling model for IT change management....Pages 361-366
Design and Implementation of a Multi-sensor Mobile Platform....Pages 367-372
Methods based on fuzzy sets to solve problems of Safe Ship control....Pages 373-377
Network Topology Impact on Influence Spreading....Pages 379-384
An Adaptive Combiner-Equalizer for Multiple-Input Receivers....Pages 385-390
KSAm – An Improved RC4 Key-Scheduling Algorithm for Securing WEP....Pages 391-396
Ubiquitous Media Communication Algorithms....Pages 397-401
Balancing Streaming and Demand Accesses in a Network Based Storage Environment....Pages 403-408
An Energy and Distance Based Clustering Protocol for Wireless Sensor Networks....Pages 409-412
Encoding Forensic Multimedia Evidence from MARF Applications as Forensic Lucid Expressions....Pages 413-416
Distributed Modular Audio Recognition Framework (DMARF) and its Applications Over Web Services....Pages 417-422
The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement....Pages 423-429
Performance Evaluation of MPLS Path Restoration Schemes using OMNET++....Pages 431-436
FM Transmitter System for Telemetrized Temperature Sensing Project....Pages 437-442
Enhancing Sensor Network Security with RSL Codes....Pages 443-447
The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement....Pages 449-455
A Multi-layer GSM Network Design Model....Pages 457-460
Performance Analysis of Multi Carrier CDMA and DSCDMA on the basis of different users and Modulation scheme....Pages 461-463
Scalability Analysis of a Model for GSM Mobile Network Design....Pages 465-469
Location Management in 4G Wireless Heterogeneous Networks using Mobile Data Mining Techniques....Pages 471-476
A new clustered Directed Diffusion Algorithm based on credit of nodes for wireless sensor networks....Pages 477-481
Multiview Media Transmission Algorithm for Next Generation Networks....Pages 483-487
A 4 GHz Clock Synchronized Non Coherent Energy Collection UWB Transceiver....Pages 489-493
Comparison of Cascaded LMS-RLS, LMS and RLS Adaptive Filters in Non-Stationary Environments....Pages 495-499
Data Mining Based Network Intrusion Detection System: A Survey....Pages 501-505
VDisaster recovery with the help of real time video streaming using MANET support....Pages 507-512
Back Matter....Pages 513-517