AdHoc MeldungenAffiliate & PublisherAdvertiser & MerchantAcademyAntwortenArtikelsucheAdventskalender SuperClix - das Partner-Programm-NetzwerkAffilitivProduktdatenPreisvergleich
Artikelsuche & Preisvergleich:


· 1 · ::::: · 7 ·· 8 ·· 9 ·· 10 ·· 11 ·· 12 ·· 13 · ::::: · 17 ·

Introduction to GloMoSim

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Network Simulator may be the fastest growing technologies in our research culture today. To study of GloMoSim is both exciting and challenging. It is exciting because it presents a wide range of programming techniques that make it possible to solve larger and more complex problems. It is challenging because the richness of C language brings with it many concepts that change the way we approach the protocol design. Because the study of GloMoSim is such a rich subject, you will find that it is not possible to cover all of the material in one term. In fact, GloMoSim is such a rich network simulator that you will find it taught in UG and PG graduate programs and research programs. ····· 1036199870

Can delay based protocols survive in real world?

für 35.91€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
TCP is a widely used congestion protocol in Internet, it uses packet losses as congestion signals. Delay-based protocols use observed packet delays along with packet losses as congestion signals. Delay-based congestion protocols are shown to provide may benefits in homogeneous environments, but struggle to compete against loss-based protocols such as TCP. For delay-based protocols to be practical, they need to be incrementally deployable and hence need to compete with TCP in current Internet. This book explores the design of such a delay-based protocol, PERT (enhanced), that can compete with TCP and prove this through evaluations. We show that PERT experiences lower drop rate than TCP-SACK and leads to lower overall drop rates with different mixes of PERT and other loss based congestion control protocols. We also show that a single PERT flow can fully utilize a high-speed, high-delay link. We investigate if potential noise and variability in delay measurements in environments such as cable and ADSL access networks impact the protocol behaviour significantly. ····· 1036199786

Practical & Real Time IP Routing Table Compression

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In an attempt to slow the exhaustion of the Internet Protocol (IP) address space, Class-less Inter-Domain Routing (CIDR) was adopted. However, the decision to utilize CIDR also increases the size of the routing table, since it allows an arbitrary partitioning of the routing space. A scheme to reduce the size of routing table in the CIDR context is detailed. A well-known and highly e cient heuristic to perform 2-level logic minimization is extended to compress the routing table. IP routing table represented as a set of completely speci ed logic functions can be compressed to about 25% in size, while ensuring that routing table updates are handled in real-time. The resulting routing table can be used with existing routers without needing any change in architecture. By compressing the IP routing table as proposed, less complex hardware than Ternary CAM (TCAM) can be used to achieve exact functionality. This approach also reduces lookup latency by about 46%, hardware area by 9% and power consumed by 15% in contrast to a traditional TCAM based implementation. ····· 1036199690

Systems of optical interconnections

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Nowadays, thanks to the utilization of Raman fiber amplifiers, of new fibers, of new techniques for broadband dispersion compensation and broadband dispersion management, the potential bit-rate per WDM channel has increased to 40Gb/s and higher. Unfortunately, the capability of switching and routing will never been able to support the perspective spectacular improvement on transmission capability if it will be still implemented using only the convectional hard-wired architecture. Short-haul optical interconnection is the most promising candidate for providing a solution for hard-wired deadlock. Therefore, this book deals with the topic of optical interconnections with aim of seeking new architectures an subsystems to be adopted at multiple hierarchic levels of a WDM network: in part I we focus on long-haul or local-area optical scenarios characterized by kilometric distances between devices in part II we study the innovative optical interconnection scenarios on uncommon optical distances inside the box` (in the order of meters/centimetres), i.e., to implement rack-to-rack and backplane connections. ····· 1036199570

Wireless Mesh Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
For the last decade or so wireless and mobile communication and its application have been enjoying tremendous attention because of their unique features. More recently, an increasing emphasis has been on the potential of infrastructure less wireless mobile networks that are easy, fast and in-expensive to set up, with the view that such technologies will enable numerous new applications in a wide range of areas. Wireless Mesh Networks (WMNs) is one of such network for providing wireless broadband internet connectivity over a selected geographic region. However, security in WMNs is still its primary stage as very little attention has been devoted so far to this topic by the research community. At the same time a lots of security based protocol has been proposed and developed for wireless ad hoc network. This thesis is concerned with the security issues of WMNs, analysis of security solutions for WMNs. ····· 1036199515

Steganography and Steganalysis of JPEG Images

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganography has advantages over cryptography since message can be communicated to the desired recipient without raising any suspicion. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. This book describes three JPEG steganography algorithms and one steganalysis algorithm. The steganography algorithms are primarily based on restoring the statistics of a JPEG image after embedding data in them which results in low detection rate as compared to other existing algorithms. The steganalysis algorithm uses second order statistical features along with machine learning to train and predict if an image contains embedded message. Steganography can be used in many applications. In commercial sector, data hiding techniques can be used to enforce copyright on a digital medium. The access control information can be embedded inside the digital medium which can eventually be verified by the media player before playing the file. ····· 1036199498

Integration of Web Services & Mobile Agents in Distributed Systems

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Web services are widely used in current web based business applications, and form basis for emerging frameworks in all types of computing platforms. Current mobile agent systems implement similar mechanisms for service description, invocation and discovery. The research technique proposed in this book provides with a solution to open up the usage of mobile agent systems via the bridge of emerging Web Services (WS) standard technology to achieve interoperability. We have developed integration architecture, called Web Service Mobile Integration (WSMI), with twofold goal of exporting mobile agent functions with a web service interface and of simplifying access to legacy web service components from any mobile agent system. This promotes the uniform access to different mobile agent system functions, independently of the specific mobile agent implementation. We have thoroughly evaluated the Web Service Mobile Integration prototype performance, by comparing its functions with similar non-web service based facilities. ····· 1036199479

Secured Image and Video Stream Across Wireless Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Recent advances in digital media technologies have created a large number of secured multimedia applications. Those applications and services are often deployed in a wireless network environment. This book presents a new model for the three tier transcoding architecture. The objective of that model is to minimize the transcoding process while upholding the security aspect of the stream. In addition, a novel security technique is proposed. This technique is mainly designed to provide more security on higher levels of applications. A novel and simple scrambling method was proposed too. The results of implementing the developed security techniques according to the selective encryption equation of the off-line-scenario are deployed and analyzed. ····· 1036199445

Network Simulation Guide

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book provides the specialists in the computer networking field with the necessary knowledge to understand and use a network simulation facilities. It begins, in chapter one, by defining the important terminologies and concepts in this field, then exploring the various mathematical methods to build a network simulator. Chapter two, gives an overview of the different simulation tools available nowadays together with their important features. Chapter three presents the details of the adopted simulation package in this book, OPNET IT GURU. In chapter four, the basic simulation strategies of the free academic version OPNET IT GURU is detailed. Finally, different lab experiments and case studies are illustrated to enrich reader experience. This book could be useful in teaching different courses, for both under and postgraduate levels, such as: computer networking, network simulation and computer networking laboratory. ····· 1036199295

IEEE 802.15.4 Protocol Implementation on FPGA

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The IEEE 802.15.4 is a wireless standard introduced for low power, low cost wireless communication with moderate data rates. In the next few years, it is expected that Low Rate Wireless Personal Area Networks (LR-WPAN) will be used in a wide variety of embedded applications, including home automation, industrial sensing and control, environmental monitoring and sensing. Wireless Pan employs one of the two connection arrangements namely full mesh topology and partial mesh topology. One of the MAC schemes proposed is slotted Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), and this paper analyzes whether this scheme meets the design constraints of those low-power and low-cost sensor networks. ····· 1036199267

Message Delivery for Intermittently-Connected Heterogeneous Networks

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
As the networks are becoming increasingly heterogeneous, it is expected that future internetworks will interconnect different types of network including infrastructure-based and ad-hoc wireless networks. Moreover, a number of emerging applications such as environmental monitoring, emergency response, etc., require that future internetworks be tolerant to connectivity disruptions. Interconnecting these heterogeneous networks poses several challenges including seamless message delivery and identification of mobile nodes. This book present 3 major contributions: 1) A classification of existing DTN routing protocols by breaking up existing routing strategies into tunable routing modules. 2) A new message delivery framework called MeDeHa to provide message delivery across heterogeneous networks prone to intermittent connectivity. MeDeHa is able to seamlessly bridge infrastructure-based and ad-hoc networks, through devices carrying multiple interfaces and by the integration of existing protocols. 3) A naming mechanism called HeNNA for heterogeneous networks prone to connectivity disruptions, which provides message delivery to nodes irrespective of their IP addresses. ····· 1036199264

Dynamic Web Services Discovery

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Recent advancement in web services plays an important role in business to business and business to consumer interaction. Discovery mechanism is not only used to find a suitable service but also provides collaboration between service providers and consumers by using standard protocols. This research has proposed an efficient dynamic web services discovery mechanism that can locate relevant and updated web services from service registries and repositories with timestamp. It is based on indexing value and categorization for faster and efficient discovery of service. The proposed prototype focuses on quality of service issues and introduces concept of local cache, categorization of services, indexing mechanism, CSP (Constraint Satisfaction Problem) solver, aging and usage of translator. Performance of proposed framework is evaluated by implementing the algorithm. The results of proposed framework show greater performance and accuracy in dynamic discovery mechanism of web services. It resolves the existing issues of flexibility and scalability based on quality of service. It discovers updated and most relevant services with ease of usage. ····· 1036199239

Dealing with Elephants in the Internet

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Today there exist various independent mechanisms that use flow-based approaches for performing QoS provisioning, control and other operations such as flow routing, flow accounting, etc. To build a flow-based future Internet, there is a need to combine different strategies, not only to achieve the desired QoS performance but also to do so in a scalable and efficient manner, while keeping the network robust against unexpected changes in the system. Deploying a flow-based policy involves (i) developing the functional aspects that operate at the control plane of the router, taking decisions at the flow level, and (ii) the implementation of the same in the switching plane of the router. This dissertation addresses the three important design principles of scalability, efficiency and robustness to build a deployable flow-based future Internet that aims at improving the performance of small flows, in the context of an increasing mice-elephant phenomenon. ····· 1036199222

Enhanced IEEE 802.11 by Integrating Multiuser Dynamic OFDMA

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In this research, we have shown that the medium access control protocol overhead and collisions in contention control messages play a significant role in the performance issues of IEEE 802.11, especially when the number of contending devices is fairly high. To improve its performance, multiuser dynamic OFDMA based IEEE 802.11 DCF has received significant interest from the researchers in recent time. After carefully considering the major drawbacks of the existing research works that have incorporated OFDMA at the physical layer, we have proposed a novel OFDMA based IEEE 802.11 enhancement with a complete DCF. By dividing the channel into the optimum number of sub-channels to allow disjoint groups of devices to simultaneously contend for channel access, our DCF can allow multiple concurrent transmissions or receptions to reduce collisions and consequently improve the throughput and delay significantly. We have developed a complete analytical model of our proposed DCF and demonstrated the effectiveness and superiority of the proposal for access point based operations of IEEE 802.11 in a single cell saturated network. Finally, we have extended our work to support ad hoc operations. ····· 1036199212

Secure Routing In Wireless Mobile Ad Hoc Network

für 35.91€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Mobile Ad-hoc network (MANET) has become particularly vulnerable to intrusion, as they operate in open medium, and use cooperative strategies for network communications.We have used AODV routing protocol and we have make it more secure routing protocol and detected the black hole attack using last transmission time. Security of our approach is better than AODV`s security. Here we are saving memory requirement for detection of black hole attack. ····· 1036198923

Remote service discovery and control

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Ubiquitous computing, which is the distribution of computing systems in environments that appear seamless to users, is increasingly becoming part of people`s life. For example consumer electronics with Digital Living Network Alliance (DLNA) support, such as TVs and mobile phones, now allow users to easily discover and control each other. This allows users to instantly show photos from their mobile phone on a TV. A fundamental enabler for many such ubiquitous computing scenarios is service discovery. This book presents use cases, architecture and prototypes for remote service discovery and control. The solution is based on the SIP Presence framework. It is also designed to work with the IP Multimedia Subsystem (IMS), which is emerging as the service control function for core networks. Use cases covered include remote multimedia access, remote facility management and service delivery to ad-hoc environments. ····· 1036198847

Wireless Networks: A Mobile Broadband Infrastructure

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The rapid deployment and self organization have turned ad hoc networks into a viable solution to a diverse domain of applications. Ad hoc networking will play a major role in the Any Where Any Time generation of future wireless communications. However, existing ad hoc networks are not yet ready for such a transition. In this context, the scalability and broadband capabilities represent major challenges that demand immediate but serious attention. The infrastructureless organization of ad hoc networks takes a big toll on the performance and related quality features. While current infrastructured ad hoc networks perform more efficiently than those without infrastructure, they still have major problems and cannot ensure a safe leap to the next generation of wireless communications. In this book, major challenges imposed by future ad hoc networks are investigated and a two-layer broadband infrastructure is proposed. The design of the proposed infrastructure is motivated by the role of ad hoc networks in the next generation of wireless systems and the expected demands on high capacity communications. ····· 1036198746

Multi-Level Client Server Network and Its Performance Analysis

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Multi-level client-server network is a modernized form of client-server network for a special reason that is, here different applications and protocols are assigned in individual server. So, if one of the servers is crashed or stopped for a small or long time all the functions do not stop. It means all servers are individually configured such as DHCP server, DNS Server, Mail Server, FTP Server etc. for different purposes. In traditional client-Server Network system a client uses several applications from the same server. If the server is crashed, the total work of that network will be stopped. So, in case of corporate network it is essential to get flawless performance all the time. Corporate offices have their own head office, branch offices and e-commerce customers. To support all of them the corporate office can setup it s own ISP to support the branch offices as well as the registered customers of the office. For better support without using multi-layer network they can use multi-level network to give flawless service to the office executives, marketers and the customers. By applying this multi-level network, professionals can easily save their time for network performances. ····· 1036198723

Wireless Sensor Platform for Sporting Applications

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book revolves around the application of the wireless sensor networks for monitoring the fitness levels of the sports players in real time. A wireless sensor platform is developed to enable rapid proto-typing for such applications. The main focus of this work is the design and implementation of a time-sharing protocol,considering the application specific requirements like huge volume of raw data from that of say, a 3-axis accelerometer and covering the entire play-field with the tiny nodes. Real world tests are conducted with multiple nodes in various environments to validate the performance of the protocol. Test results indicate that the packet error/loss is less than 1% with multiple nodes streaming data to a single server. Further enhancements and optimization are performed to make the protocol better suited for the sporting applications. This book is the outcome of the Master Thesis of Rama Subramanian S in Delft University of Technology and is carried out in and funded by Philips Research Eindhoven, The Netherlands. ····· 1036198639

20 Gbps NetFPGA Router

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book provides a deep look of the functionality of the router and suggests a way to enhance the processing power to several Gigabits per second and provides a solution to the future high speed networks. Since, router`s are key elements in computer networks so without enhancing there power nothing significant could be achieved in this field. So, my effort was one step towards supporting future data networks. ····· 1036198575

L-Band Bismuth-Based Erbium-Doped Fibre Amplifier

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Characterization study of Bismuth-based Erbium-doped Fibre (Bi-EDF) and its performance as gain medium for L-band Erbium-doped Fibre Amplifier (EDFA) is studied. Bismuth oxide glass host enables very high erbium doping concentration without significant concentration quenching effect. The Bi-EDF studied is only 2.15m long with Erbium ion concentration of 3,250 wt. ppm. corresponding to a maximum absorption coefficient of 157.61dB/m at 1530nm. With optimum excitation, Bi-EDFA exhibits small signal gain bandwidth of over 70nm ranging from 1550nm to 1620nm. Maximum signal gain per length coefficient at 1580nm for Bi-EDFA is 12.7dB/m. A 56nm 3dB gain bandwidth with average gain of 18.6dB is achieved. Improvement on the small signal gain performance of Bi-EDFA is demonstrated in a two-stage EDFA configuration. By utilizing C-band ASE generated by Bi-EDFA as pump source for a second stage EDF, maximum small signal gain improvement of 5.0dB over the single stage Bi-EDFA is observed. ····· 1036198506

Embedding Privacy in Data Mining

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In recent years, Privacy Preserving Data Mining has emerged as a very active research area. This field of research studies how knowledge or patterns can be extracted from large data stores while maintaining commercial or legislative privacy constraints. Quite often, these constraints pertain to individuals represented in the data stores. While data collectors strive to derive new insights that would allow them to improve customer service and increase sales, consumers are concerned about the vast quantities of information collected about them and how this information is put to use. The question how these two contrasting goals can be reconciled is the focus of this work. We seek ways to improve the tradeoff between privacy and utility when mining data. We address this tradeoff problem by considering the privacy and algorithmic requirements simultaneously, in the context of two privacy models that attracted considerable attention in recent years, k-anonymity and differential privacy. Our analysis and experimental evaluations confirm that algorithmic decisions made with privacy considerations in mind may have a profound impact on the accuracy of the resulting data mining models. ····· 1036198497

Multimedia Traffic Scheduling in Future Wireless Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Providing delay guarantees to time-sensitive multimedia traffic in future wireless networks is a challenging problem. This is due to the time-varying link capacities and the variety of real-time applications expected to be handled by such networks. Multiuser diversity schemes that exploit the variations in the users` channel conditions offer orders of magnitude increase in the performance of wireless systems. This book addresses the problem of channel-aware scheduling of delay bounded traffic for two different wireless network models: Time Division Multiple Access (TDMA) and Orthogonal Frequency Division Multiple Access (OFDMA) broadband wireless networks. A unique feature of this work is the explicit provisioning of statistical QoS while enhancing fairness in data rates, delay bounds, and delay bound violations. We provide extensive simulation results to show the different performance aspects of the proposed schemes. ····· 1036198428

Hash Based Data Text Fusion using Speech Signal Algorithm

····· lezzter Preis 49.90€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Digital Steganography is the process of hiding a message in a cover signal. This book shows the various technique available for hiding text data in a speech signal. The process of hiding digital data(such as speech, text, and image) in a Speech Signal is called Speech Steganography. This book i have also discusses the differences between Steganography, Digital Watermarking and Cryptography dealing with a Speech Signal. ····· 1036192630

· 1 · ::::: · 7 ·· 8 ·· 9 ·· 10 ·· 11 ·· 12 ·· 13 · ::::: · 17 ·