Advanced Computing, Networking and Informatics- Volume 2: by Malay Kumar Kundu, Durga Prasad Mohapatra, Amit Konar, Aruna

By Malay Kumar Kundu, Durga Prasad Mohapatra, Amit Konar, Aruna Chakraborty

Advanced Computing, Networking and Informatics are 3 specific and collectively particular disciplines of information with out obvious sharing/overlap between them. despite the fact that, their convergence is saw in lots of actual global functions, together with cyber-security, net banking, healthcare, sensor networks, cognitive radio, pervasive computing amidst many others. This two-volume court cases discover the mixed use of complex Computing and Informatics within the subsequent iteration instant networks and safeguard, sign and photo processing, ontology and human-computer interfaces (HCI). the 2 volumes jointly contain 148 scholarly papers, which were accredited for presentation from over 640 submissions within the moment overseas convention on complicated Computing, Networking and Informatics, 2014, held in Kolkata, India in the course of June 24-26, 2014. the 1st quantity contains cutting edge computing ideas and suitable study leads to informatics with selective functions in development attractiveness, signal/image processing and HCI. the second one quantity nevertheless demonstrates the potential scope of the computing innovations and informatics in instant communications, networking and security.

Show description

Read Online or Download Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014) PDF

Best networking books

802.1X Port-Based Network Access Authentification

Written to entice a huge viewers, 802. 1X Port-Based Authentication seeks to outline this complicated inspiration in available phrases and to discover its a number of purposes to ultra-modern laptop networks utilizing this actual community protocol. this article assumes that the reader can have very little earlier wisdom and just a normal knowing of computing device networking, proposing an introductory evaluation in addition to a subject matter evaluation in every one bankruptcy.

Extra info for Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014)

Sample text

In the era of intelligent transportation convergence, traffic monitoring requires traffic sensory technologies. We tabulate various realistic traffic sensors which aim to address the technicalities of both point and mobile sensors and also increase the scope to prefer an optimal sensor for real time traffic data collection. The present analysis extracted data from Mobile Century experiment. The data obtained in the experiment was pre-processed successfully by applying data mining pre-processing techniques such as data transformation, normalization and integration.

Here we define a mobile agent clone as the copy of the agent which has the same code and data as the original agent at some state. Here it is assumed that the clone is similar to its original copy and hence carries with it critical code and data when it migrates to the next node. 1 Problem Description A node in the network having mobile agent platform spawns mobile agents if it needs to collect (spread) information from (to) N (<= total no. of nodes in the network) hosts in the network. The owner may send an agent with N nodes in its trail or may divide the job to several agents depending on agent performance and network conditions.

2 Related Work In mobile agent computing environment either the agent may fail due to software failure or the nodes or links in the underlying environment may fail. In either case the agents could not make successful migration. Therefore, fault-tolerance measures should be taken while deploying the mobile agents. Fault tolerance schemes for mobile agents to survive agent server crash failures are complex as execution of agent code at the remote hosts could not be controlled. There are [6], [7] several ideas presented to implement fault-tolerance in mobile agents.

Download PDF sample

Rated 4.47 of 5 – based on 45 votes