By Malay Kumar Kundu, Durga Prasad Mohapatra, Amit Konar, Aruna Chakraborty

Advanced Computing, Networking and Informatics are 3 unique and collectively unique disciplines of information without obvious sharing/overlap between them. in spite of the fact that, their convergence is saw in lots of genuine international functions, together with cyber-security, web banking, healthcare, sensor networks, cognitive radio, pervasive computing amidst many others. This two-volume court cases discover the mixed use of complex Computing and Informatics within the subsequent iteration instant networks and safeguard, sign and snapshot processing, ontology and human-computer interfaces (HCI). the 2 volumes jointly comprise 148 scholarly papers, which were authorized for presentation from over 640 submissions within the moment foreign convention on complicated Computing, Networking and Informatics, 2014, held in Kolkata, India in the course of June 24-26, 2014. the 1st quantity contains cutting edge computing suggestions and appropriate study ends up in informatics with selective purposes in development attractiveness, signal/image processing and HCI. the second one quantity however demonstrates the potential scope of the computing ideas and informatics in instant communications, networking and security.

Show description

Read Online or Download Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014) PDF

Best networking books

Digital Compensation for Analog Front-Ends: A New Approach to Wireless Transceiver Design

The will to construct cheaper price analog front-ends has caused curiosity in a brand new area of analysis. accordingly the joint layout of the analog front-end and of the electronic baseband algorithms has turn into a massive box of study. It allows the instant structures and chip designers to extra successfully alternate the verbal exchange functionality with the construction rate.

Extra info for Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014)

Example text

2005) 17. : A Cellular Automaton Model for Car Traffic with a Slow-toStop Rule. In: Maneth, S. ) CIAA 2009. LNCS, vol. 5642, pp. 44–53. Springer, Heidelberg (2009) 18. : A Parallel Encryption Algorithm for Block Ciphers Based on Reversible ProgrammableCellular Automata. Journal of Computer Science And Engineering 1(1), 82– 90 (2010) 19. : A Survey on Cellular Automata and Its Applications. , Ariwa, E. ) ObCom 2011, Part I. CCIS, vol. 269, pp. 753–762. Springer, Heidelberg (2012) 20. : Parallel Processing Concept Based Road Traffic Model.

Based on Hybrid Genetic Algorithm and Cellular Automata Combined Traffic Signal Control and Route Guidance. In: Chinese Control Conference, pp. 53–57 (2007) 6. : Study of Self-Organizing Control of Traffic Signalsin an Urban Network based on Cellular Automata. IEEE Transactions on Vehicular Technology 54(2), 744–748 (2005) 7. Wolfram, S. ): Theory and applications of CA. WorldScientific (1986) 8. Traffic and Granular Flow. Springer (1996,1998,2000,2001) 9. : Vehicular Networks, From Theory to Practice.

Since mobile agents migrate from one node to the other collecting and/or spreading meaningful information, loss of a mobile agent results in more data loss as compared to loss of a message. The longer the trail an agent needs to visit, the chance of errors is more. Chances of migrating to a malicious node are even higher. In this paper, a fault tolerance scheme is proposed for the agents in order to prevent them from getting lost while en’route. The scheme uses the concept of cloning. The clone is a copy of a mobile agent, with no critical code and data.

Download PDF sample

Rated 4.68 of 5 – based on 5 votes