Computer Networks and Information Technologies


Book Description

This book constitutes the refereed proceedings of the Second International Conference on Advances in Communication, Network, and Computing, CNC 2011, held in Bangalore, India, in March 2011. The 41 revised full papers, presented together with 50 short papers and 39 poster papers, were carefully reviewed and selected for inclusion in the book. The papers feature current research in the field of Information Technology, Networks, Computational Engineering, Computer and Telecommunication Technology, ranging from theoretical and methodological issues to advanced applications.




Soft Computing Techniques and Applications


Book Description

Focusing on soft computing techniques and application in various engineering research domains, this book presents the state-of-the-art outcomes from ongoing research works being conducted in various research laboratories and educational institutions. The included research works deal with estimated models and give resolutions to complex real-life issues. In the field of evolutionary computing and other domains of applications, such as, data mining and fuzzy logic, soft computing techniques play an incomparable role, where it successfully handles contemporary computationally intensive and complex problems that have usually appeared to be inflexible to traditional mathematical methods. Comprising the concepts and applications of soft computing with other emerging research domains, this book cherishes varieties of modern applications in the fields of natural language processing, image processing, biomedical engineering, communication, control systems, circuit design etc.




Secure Self Re-Organizing of Nodes Using Closeness Technique in Cluster MANET


Book Description

Mobile ad hoc network (MANET) is defined as a self-configuring infrastructureless network used for communication by wireless links with the support of mobile devices. A MANET is referred to as a wireless network with independent nodes moving freely with respect to each other. Due to the independent free moves of nodes, a huge amount of packet data loss occurs in transmitting the packet from source to destination. The risk of node misbehaviour is extremely high. The unsecured ad hoc network environment is initiated due to the active nature of networks and node mobility. In addition, the task of key management is more complex in ad hoc network. Due to the nature of free moving characteristics, MANET faces improper node cooperation. The main reason behind ineffective node cooperation is presence of malicious or selfish nodes. Moreover, the existence of malicious unauthenticated nodes causes insecure communication. Hence, the proposed system aims in the development of proper node cooperation, malicious node detection and secure communication in MANET.




Distributed Computing and Internet Technology


Book Description

The opening ceremony and pre-conference tutorials on various related topics were held on December 21. The technical program started on December 22 and continued for three days. The program was arranged in single track so as to enable participants to attend sessions of di?erent tracks. Papers from the DM, IT, SE, and SS tracks were divided into two sessions, whereas DC track sessions were held on the ?rst two days of the conference. The program also included two plenary talks. The ?rst talk was delivered by S. S. Iyengar from Louisiana State University, USA. The second talk was delivered by He Jifeng from the International Institute for Software Technology (IIST) Macau. Prof. Iyenger’s talk on “The Distributed Sensor Networks — An Emerging Technology” was focused on new ideas about the use of distributed systems for emerging technology, while Prof. Jifeng’s talk on “Linking Theories of Concurrency by Retraction” dealt with semantics of concurrency. All the conference committee members contributed towards the success of ICDCIT 2005. And it was a pleasant experience for me to work with them. The one name that sticks out is R. K. Ghosh, Steering Committee Chair. He really steered the group with his past experience as Program Chair of ICDCIT 2004.




Parallel and Distributed Processing and Applications


Book Description

This book constitutes the refereed proceedings of the Second International Symposium on Parallel and Distributed Processing and Applications, ISPA 2004, held in Hong Kong, China in December 2004. The 78 revised full papers and 38 revised short papers presented were carefully reviewed and selected from 361 submissions. The papers are organized in topical sections on parallel algorithms and systems, data mining and management, distributed algorithms and systems, fault tolerance protocols and systems, sensor networks and protocols, cluster systems, grid applications and systems, peer-to-peer and ad hoc networking, grid scheduling and algorithms, data replication and caching, software engineering and testing, grid protocols, context-aware and mobile computing, distributed routing and switching protocols, cluster resource scheduling and algorithms, security, high performance processing, networking and protocols, artificial intelligence systems, hardware architecture and implementations, high performance computing architecture, and distributed systems architecture.




Handbook of Approximation Algorithms and Metaheuristics


Book Description

Handbook of Approximation Algorithms and Metaheuristics, Second Edition reflects the tremendous growth in the field, over the past two decades. Through contributions from leading experts, this handbook provides a comprehensive introduction to the underlying theory and methodologies, as well as the various applications of approximation algorithms and metaheuristics. Volume 1 of this two-volume set deals primarily with methodologies and traditional applications. It includes restriction, relaxation, local ratio, approximation schemes, randomization, tabu search, evolutionary computation, local search, neural networks, and other metaheuristics. It also explores multi-objective optimization, reoptimization, sensitivity analysis, and stability. Traditional applications covered include: bin packing, multi-dimensional packing, Steiner trees, traveling salesperson, scheduling, and related problems. Volume 2 focuses on the contemporary and emerging applications of methodologies to problems in combinatorial optimization, computational geometry and graphs problems, as well as in large-scale and emerging application areas. It includes approximation algorithms and heuristics for clustering, networks (sensor and wireless), communication, bioinformatics search, streams, virtual communities, and more. About the Editor Teofilo F. Gonzalez is a professor emeritus of computer science at the University of California, Santa Barbara. He completed his Ph.D. in 1975 from the University of Minnesota. He taught at the University of Oklahoma, the Pennsylvania State University, and the University of Texas at Dallas, before joining the UCSB computer science faculty in 1984. He spent sabbatical leaves at the Monterrey Institute of Technology and Higher Education and Utrecht University. He is known for his highly cited pioneering research in the hardness of approximation; for his sublinear and best possible approximation algorithm for k-tMM clustering; for introducing the open-shop scheduling problem as well as algorithms for its solution that have found applications in numerous research areas; as well as for his research on problems in the areas of job scheduling, graph algorithms, computational geometry, message communication, wire routing, etc.




International Conference on Information Technology and Communication Systems


Book Description

This book reports on advanced methods and theories in two related fields of research, Information Technology and Communication Systems. It provides professors, scientists, PhD students and engineers with a readily available guide to various approaches in Engineering Science. The book is divided into two major sections, the first of which covers Information Technology topics, including E-Learning, E-Government (egov), Data Mining, Text Mining, Ontologies, Semantic Similarity Databases, Multimedia Information Processing, and Applications. The second section addresses Communication Systems topics, including: Systems, Wireless and Network Computing, Software Security and Monitoring, Modern Antennas, and Smart Grids. The book gathers contributions presented at the International Conference on Information Technology and Communication Systems (ITCS 2017) held at the National School of Applied Sciences of Khouribga, Hassan 1st University, Morocco on March 28–29, 2017. This event was organized with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of Information Technology and Communication Systems. It not only highlights new methods, but also promotes collaborations between different communities working on related topics.




Distributed Computing and Internet Technology


Book Description

This book constitutes the refereed proceedings of the 4th International Conference on Distributed Computing and Internet Technology, ICDCIT 2007, held in Bangalore, India, in December 2007. The 13 revised full papers and 20 revised short papers presented together with three invited papers were carefully reviewed and selected from 170 submissions. The papers cover the main areas of distributed computing, internet technology, system security, data mining, and software engineering.




Proceedings of ICETIT 2019


Book Description

This book presents high-quality, original contributions (both theoretical and experimental) on Information Security, Machine Learning, Data Mining and Internet of Things (IoT). It gathers papers presented at ICETIT 2019, the 1st International Conference on Emerging Trends in Information Technology, which was held in Delhi, India, in June 2019. This conference series represents a targeted response to the growing need for research that reports on and assesses the practical implications of IoT and network technologies, AI and machine learning, data analytics and cloud computing, security and privacy, and next generation computing technologies.




High Performance Computing - HiPC 2006


Book Description

This book constitutes the refereed proceedings of the 13th International Conference on High-Performance Computing, HiPC 2006, held in Bangalore, India in December 2006. The 52 revised full papers presented together with the abstracts of 7 invited talks were carefully reviewed and selected from 335 submissions. The papers are organized in topical sections on scheduling and load balancing, architectures, network and distributed algorithms, application software, network services, applications, ad-hoc networks, systems software, sensor networks and performance evaluation, as well as routing and data management algorithms.