<span>This two-wolume set (CCIS 1395-1396) constitutes the refereed proceedings of the Third International Conference on Futuristic Trends in Network and Communication Technologies, FTNCT 2020, held in Taganrog, Russia, in October 2020.</span><p><span>The 80 revised papers presented were carefully r
Futuristic Trends in Networks and Computing Technologies: Second International Conference, FTNCT 2019, Chandigarh, India, November 22β23, 2019, ... in Computer and Information Science, 1206)
β Scribed by Pradeep Kumar Singh (editor), Sanjay Sood (editor), Yugal Kumar (editor), Marcin Paprzycki (editor), Anton Pljonkin (editor), Wei-Chiang Hong (editor)
- Publisher
- Springer
- Year
- 2020
- Tongue
- English
- Leaves
- 717
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book constitutes the refereed proceedings of the Second International Conference on Futuristic Trends in Network and Communication Technologies, FTNCT 2019, held in Chandigarh, India, in November 2019.
The 49 revised full papers and 6 short papers presented were carefully reviewed and selected from 226 submissions. The prime aim of the conference is to invite researchers from different domains of network and communication technologies to a single platform to showcase their research ideas. The selected papers are organized in topical sections on network and computing technologies; wireless networks and Internet of Things (IoT); futuristic computing technologies; communication technologies, security and privacy.
β¦ Table of Contents
Preface
Organization
Contents
Network and Computing Technologies
A Review of LEACH Successors Using Single-Hop and Multi-Hop Communication Model
Abstract
1 Introduction
1.1 LEACH βLow Energy Adaptive Clustering Hierarchyβ Algorithm
2 LEACH Successors Using Single Hop Communication Model
2.1 LEACH-C
2.2 DCHS-LEACH
2.3 Unequal Clustering LEACH (U-LEACH)
2.4 Genetic Algorithm-Based LEACH
2.5 Energy Potential LEACH (EP-LEACH)
2.6 Improved LEACH (I-LEACH)
2.7 Vice Cluster LEACH (VC-LEACH)
3 LEACH Successors Using Multi Hop Communication Model
3.1 LEACH-B
3.2 LEACH-ME
3.3 C-LEACH
3.4 LEACH-Density
3.5 SAGA-LEACH
4 Analysis LEACH Successors
5 Conclusion
6 Future Scope
References
DELBMRFS: Design of Efficient Load Balanced Multicast Routing Protocol for Wireless Mobile Ad-hoc Network Based on Fibonacci Sequence Approach
1 Introduction
2 Contribution
3 Proposed Methodology
3.1 Basic Idea
3.2 Routing Mechanism
3.3 Route Discovery Phase
4 Performance Evaluation
4.1 Simulation Analysis
5 Conclusion
References
Analytical Study of Wireless Ad-Hoc Networks: Types, Characteristics, Differences, Applications, Protocols
Abstract
1 Introduction
2 Classification of Ad-Hoc Networks
2.1 Wireless Mesh Network
2.2 Wireless Sensor Network
2.3 Vehicular Ad Hoc Networks
2.4 Mobile Ad-Hoc Networks
2.5 Mobile Wireless Methods
3 Routing Protocols
3.1 The Functionality of Routing Protocols
3.2 Classification of Routing Path Protocols
4 Conclusion
References
Experimental Study of the Millimeter Wave Range Receiver
Abstract
1 Introduction
2 The Structure of the Superheterodyne Millimeter Wave Range Receiver
3 Protective Device Tests
4 Mixer Tests
5 Experimental Study of a Logarithmic Detector
6 The Millimeter Waves Receiver Tests
7 Conclusions
References
Smart Platforms of Air Quality Monitoring: A Logical Literature Exploration
Abstract
1 Introduction
2 Background
2.1 Air
2.2 Air Pollutants
2.3 Air Quality Monitoring Index
3 Cloud Computing and Environmental Benefits
4 Cloud Computing Based Modeling for AQI
5 Summary
6 Future Work
References
An Efficient SIP Authentication Scheme for Multiserver Infrastructure
Abstract
1 Introduction
2 Motivation and Contribution
3 Literature Review
4 Proposed Model
4.1 A Initiation Phase
4.2 Server Registration Phase
4.3 User Registration Phase
4.4 Login and Authentication Phase
4.5 Password Change Phase
5 Security Analysis
5.1 Formal Security Analysis
5.2 Informal Security Analysis
5.3 Comparative Security Analysis
6 Conclusion and Future Scope
Acknowledgements
References
Synchronization of the Quantum Key Distribution System with Priori Information About the Fiber-Optic Line Length
Abstract
1 Introduction
2 Algorithm of Two-Stage Single-Photon Synchronization with a Priori Information in Relation to the Length of the Fiber-Optic Line
3 Probabilistic Characteristics of a Synchronization Algorithm
4 The Change in the Probability of Synchronization Errors Along the Link Length
5 Conclusion
Acknowledgment
References
Single-Photon Algorithm for Synchronizing the System of Quantum Key Distribution with Polling Sections of a Fiber-Optic Line
Abstract
1 Introduction
2 Justification of the Method of One-Photon Synchronization of Autocompensation System of Quantum Key Distribution
3 Synchronization Algorithm with a Sequential Plot FOL with a Losting Length
4 Probability of Synchronization Error
5 Formulation of Requirements for the Selection of the Number of Time Personnel and Tests
6 Change of Probability of Synchronization Error Length FOL
7 Findings
Acknowledgment
References
Adaptive Noise Generator for Masking Side Electromagnetic Radiation and Interference
Abstract
1 Introduction
2 The Proposals for the Construction of Adaptive Noise Generators
3 Conclusion
References
Wireless Networks and Internet of Things (IoT)
A Comparative Analysis of Application of Proposed and the Existing Methodologies on a Mobile Phone Survey
Abstract
1 Introduction
2 Related Work
3 Research Data and Research Methodology
3.1 Dataset
4 Results and Comparison
5 Conclusion
References
A Review on Interoperability and Integration in Smart Homes
Abstract
1 Introduction
1.1 Interoperability and Integration
1.2 Security
1.3 Privacy
1.4 Data Storage
1.5 Constrained Resources
1.6 Data Analysis
2 Interoperability and Integration (Literature Review)
3 Findings and Research Gaps in the Purposed Solutions for Interoperability and Integration
3.1 Conclusion and Future Work
References
Testbed on MANET (ToM): Private Testbed Facility for MANET Experiment
Abstract
1 Introduction
2 Related Work
3 Testbed Management System
4 Hardware Setup for Testbed Facility
4.1 Single Board Computer (SBC) as Mobile Device in Testbed
4.2 Hardware Setup for Static Network Topology
4.3 Hardware Setup for Dynamic Network Topology Scenario
4.3.1 ToMRobot Hardware Architecture
4.3.2 Indoor Localization and Path Planning for ToMRobot
4.4 Testbed Miniaturization
5 Experiment Data Gathering
5.1 Energy Consumption
5.2 Network Traffic Statistic
6 Conclusion
References
ToMRobot 2.0: Real Mobility Mechanism in MANET Testbed Using Mobile Robot
Abstract
1 Introduction
2 Real Mobility Mechanism in MANET Testbed
3 ToMRobot Hardware Architecture
3.1 Robot Chassis
3.2 ToMRobot Controller
4 Testbed Miniaturization
5 Indoor Localization and Path Planning for ToMRobot
5.1 Hardware Components for Indoor Localization
5.2 Software Components for Indoor Localization
5.3 Path Planning, Trajectory Correction and Collision Avoidance
6 Mobility Control System (ToMMove) and Robot Operating System (ROS)
7 Conclusion
References
Modified Genetic Algorithm for Resource Selection on Internet of Things
1 Introduction
2 Motivation and Contribution
3 Preliminaries: Genetic Algorithm
4 Data Set
5 Problem Formulation
6 Proposed Modified Genetic Algorithm for Resource Selection in Internet-of-Things
6.1 Generation of Resources as Population
6.2 Generating Children of New Population
6.3 Tournament Based Selection Mechanism
6.4 Crossover Function
6.5 Mutation Function
6.6 New Population
6.7 Termination
7 Experimental Results
8 Comparison with Existing Data Sets
9 Conclusion
References
A Clustering Based Optimized PEGASIS in Wireless Sensor Networks
Abstract
1 Introduction
2 Literature Review
3 Network, Energy, and Radio Dissipation Model
4 Fuzzy Logic System for the Proposed Protocol
5 Proposed Data Collection and Aggregation Process
5.1 Chain Based Intra- and Inter-cluster Communication for Data Gathering and Transmission Process
5.2 Data Aggregation Procedure
6 Simulation Results and Discussions
6.1 Performance Evaluation for Homogeneous Networks
6.2 Performance Estimation for Heterogeneous Networks
7 Conclusion
References
M-N Hashing: Search Time Optimization with Collision Resolution Using Balanced Tree
Abstract
1 Introduction
2 Background
2.1 Separate Chaining
2.2 Linear Probing
2.3 Quadratic Probing
3 Methodology
3.1 Scalable Hash Table Generation
3.2 Search (Look up) Process
4 Analysis of Results
4.1 System and Data Description
4.2 Evaluation Parameters
4.3 Time Complexity Analysis
5 Conclusion
References
Analysis and Identification of Relevant Variables for Precision Farming Using Harmonic Systems
Abstract
1 Introduction
2 Prototype KRONOS - AGRO
2.1 Hardware and Components
2.2 Localization of the Crops Tested
3 Data Acquisition System
3.1 Sensors Calibration
3.2 Electronics
3.3 Assembly Structure
3.4 Fit Tests
4 Statistical Analysis
4.1 Variable
4.2 Clusters
4.3 Empirical Imbalance of Ambient Humidity
4.4 Discussion of Results
4.5 Validation of the Results - Krustall Wallis on the Original Dataset
4.6 Krustall Wallis of Each Cluster
4.7 Conclusions of the Analysis
5 Model for Predicting Water Stress
5.1 Rules Based on Hour and Minute
5.2 The Following Are the Resulting Rules as Used by the HS
6 Conclusions and Future Work
References
A Smart Industrial Pollution Detection and Monitoring Using Internet of Things (IoT)
Abstract
1 Introduction
2 Related Work
3 System Designs
4 Results and Discussion
5 Conclusion
6 Future Research Directions
References
Futuristic Computing Technologies
Comparative Analysis of Different Machine Learning Techniques
Abstract
1 Introduction
2 Literature Review
3 Data Mining Techniques
3.1 Supervised Learning
3.2 Unsupervised Learning
3.3 Machine Learning Techniques for Bug Detection
4 Feature Selection Technique
5 Mathematical Model
6 Conclusion
References
Book References
Suicidal Tendency on Social Media by Using Text Mining
Abstract
1 Introduction
2 Objective
3 Methods and Materials
3.1 Collection of Data
3.2 Data Preprocessing
3.3 Machine Learning Classifier
4 Experiment and Results
5 Conclusion and Future Scope
References
Classification of Imbalanced Data: Addressing Data Intrinsic Characteristics
Abstract
1 Introduction
2 Related Work
3 Nature of the Problem
3.1 Small Disjuncts
3.2 Lack of Density
3.3 Overlapping or Class Separability
3.4 Noisy Data
3.5 Borderline Examples
3.6 Dataset Shift
4 Proposed Solutions
4.1 Algorithm for Solving the Issue of Small Disjuncts
4.2 Algorithm for Solving the Issue of Lack of Density
4.3 Algorithm for Solving the Issue of Overlapping
4.4 Algorithm for Solving the Issue of Noise
4.5 Algorithm for Solving the Issue of Borderline
4.6 Algorithm for Solving the Issue of Data Shift
5 Experiment and Results
5.1 Experimental Setup
5.2 Dataset Preparation
5.3 Results and Discussion
6 Conclusion
References
Heterogeneous Cross Project Defect Prediction β A Survey
Abstract
1 Introduction
2 Heterogeneous Cross Project Defect Prediction (HCPDP)
2.1 Basic Terminologies
2.2 Basic HCPDP Model
3 Related Work
4 Conclusion and Future Work
References
Deep Learning for Textual Emotion Mining
Abstract
1 Introduction
2 Search Strategy and Selection Criteria
3 Emotion Mining from Text: Related Work
3.1 Tasks
3.1.1 Emotion Classification
3.1.2 Emotion Intensity Detection
3.1.3 Emotion Cause Detection
3.2 Approaches
3.3 Current Challenges
4 Application of Deep Learning for Emotion Mining
5 Discussion and Conclusion
References
The Cascade Generation Nature of Compartmental Models - A Comparative Study
Abstract
1 Introduction
2 Related Work
3 Motivation
4 Definitions
5 Model and Dataset Description
5.1 Model Description
5.2 Dataset Description
6 Results, Discussion and Outcomes
6.1 Cascade Generation
6.2 Cascade Size Distribution
6.3 Breadth Cover (Nodes Produced Per Level)
6.4 Depth Cover (Levels Reached by Cascades)
6.5 Total Cover (Total Nodes Produced by All Cascades)
6.6 Frequently Generated Cascades
6.7 Outcomes of the Study
7 Conclusion and Future Scope
References
Data Mining Technologies for Identifying Brand-Switching Patterns of Customers in Telecom Domain
Abstract
1 Introduction
2 Literature Survey
3 Methodology
4 Experimental Setup
5 Analysis
6 Conclusion and Future Scope
References
Feature Selection Optimization Using Genetic Algorithm for Spambot Detection in an OSN
Abstract
1 Introduction
2 Datasets
3 Experimental Setup
3.1 Pre-processing
3.2 The Proposed Models
3.3 Feature Selection
3.4 Datasets Biasing
3.5 Classifiers Used in Our Models
3.6 Evaluation
4 Results and Analysis
5 Conclusion
References
Exhibiting the Barricades to Academic Research in Computer Science Domain: An Indian Perspective
Abstract
1 Introduction
2 Literature Review
3 Methodology
3.1 Barriers to Research
3.1.1 Inter-student and Student-Faculty Conflicts
3.1.2 Confusion in Implementing Research Due to Unawareness of Journals and Conferences
3.1.3 Trust Issues: Fear of Misuse of Collected Data
3.1.4 Lack of Adequate Time for Research Due to Other Commitments
3.1.5 No External Funding for Travelling or Publication of Research
3.1.6 Improper Monitoring by Guide, Lack of Effort and Insufficient Time, Feedback by Guide
3.1.7 Lack of Interest
3.1.8 Lack of Personal Research Traits
3.1.9 Irrelevant/Too Little Data Acquired
3.1.10 Lack of New Ideas for Research
3.1.11 Difficulty in Accessing Paid Research Papers
3.1.12 Lack of Domain Knowledge
3.2 Technique Implemented
3.2.1 Structural Self-Interaction Matrix (SSIM)
3.2.2 Reachability Matrix
3.2.3 Level Partitions
3.2.4 MICMAC Analysis
4 Results and Discussions
References
Answering Questions in Natural Language About Images Using Deep Learning
Abstract
1 Introduction
2 Problem Definition and Motivation
3 Literature Review
3.1 Datasets for VQA
3.2 Models and Approaches/Algorithms
4 Proposed Architecture
5 Outcome
6 Evaluation and Test Cases
7 Applications
8 Conclusion and Future Scope
References
Information Credibility on Twitter Using Machine Learning Techniques
Abstract
1 Introduction
2 Background Study
3 Data Extraction, Preprocessing, and Annotation
4 Features Extraction and Machine Learning Techniques
5 Conclusion and Future Work
References
Transformation Caused in the Consistency of Landcover Due to Stubble Burning in the Northern India State of Punjab from Suomi NPP Satellite Data
Abstract
1 Introduction
2 Mathematical Background of Texture Visual Features
3 Study Area
4 Experimental Result
5 Conclusion
Acknowledgment
References
Storytelling Data Visualization for Grievances Management System
Abstract
1 Introduction
2 Methodology and Tools Used
2.1 Data Understanding
2.2 Visualization Selection
2.3 Data Importance Using Gestalt Principle
2.4 Designing Strategies
2.5 Label Generation
3 Grievances Management System Analysis and Visualization Outcome
3.1 Geo-Coordinates Based Complaints Visualization
3.2 Employees Analytics
3.3 Complaint Analytics
3.4 Complaints Frequency
3.5 Complaints Remained Open
3.6 Complaint Remained Open Inside Category
3.7 Re-opened Complaint
3.8 Complaints with Severity
4 Concluding Remark
References
Susceptibility Assesment of Changes Developed in the Landcover Caused Due to the Landslide Disaster of Nepal from Multispectral LANDSAT Data
Abstract
1 Introduction
2 Mathematical Representation of the Texture Features
3 Study Area
4 Experimental Results
5 Conclusion
Acknowledgment
References
A Hybrid Model for Detecting Anomalous Ozone Values
Abstract
1 Introduction
2 Anomaly Detection Previous Work
3 Model Assumptions
3.1 Dataset Description
4 Proposed Methodology
4.1 Data Preprocessing
4.2 Input the Dataset into the Hybrid Model
5 Simulation Study
5.1 Simulation Setup
5.2 Simulation Results
5.3 Accuracy Estimation
6 Conclusion
7 Future Works
References
Evaluating the Performance of Navigation Prediction Model Based on Varied Session Length
Abstract
1 Introduction
1.1 Research Objectives
2 Preliminaries
3 Related Work
4 Experimental Details
4.1 Dataset Description
4.2 Pre-investigation Measures
4.3 Evaluation Parameters
4.4 Experimental Results
4.5 Discussion
5 Conclusion and Future Work
References
Geo-Spatial Analysis of Information Outreach in Twitter Social Network
Abstract
1 Introduction
2 Related Work
3 Model Assumptions and Algorithmic Framework
3.1 Data Sources
3.2 Languages and Libraries Used
3.3 Model Selection and Generation
3.4 Algorithm for the Model
4 Experimental Outcome
5 Conclusion
References
Sustainable Approach for Forest Fire Prediction
Abstract
1 Introduction
2 Related Works
3 Dataset
4 Data Mining Models Discussions
5 Results and Visualizations
5.1 Model Parameters Settings and Predictions
5.2 Evaluation
6 Conclusion
References
Rumour Control Model to Prevent Falsehood Propagation in Social Media
1 Introduction
2 Related Work
3 Methodology
4 Design
4.1 Dataset
4.2 Softwares and Packages Used
5 Results
6 Conclusion
References
An Inclusive Study of Several Machine Learning Based Non-functional Requirements Prediction Techniques
Abstract
1 Introduction
2 Importance of NFR
3 Process of Applying Machine Learning to NFR
3.1 Elicitation Phase
3.2 Feature Selection
3.3 Apply Machine Learning Algorithms
3.4 NFR Classification
3.5 NFR Prioritization
4 Related Work
5 Findings of the Review
6 Challenges of Existing Techniques
7 Conclusion
References
Heuristics for Minimum Weight Directed Dominating Set Problem
1 Introduction
2 Heuristics
2.1 Second Heuristic (H2)
2.2 Third Heuristic (H3)
2.3 Fourth Heuristic (H4)
2.4 Fifth Heuristic (H5)
2.5 Redundant Node Removal
3 Computational Results
4 Conclusions
References
A Database for Printed Takri Class of North-West Indian Regional Scripts
Abstract
1 Introduction
2 Available Databases of Indian Scripts
2.1 Related Work
2.2 Findings and Contributions
3 Overview of Takri Class of Scripts
3.1 History
3.2 Character Set
3.3 Features
3.4 Related Scripts
4 Printed Takri Database
4.1 Issues and Challenges
4.2 Preprocessing
5 Conclusion and Future Scope
Acknowledgement
References
A Taxonomy of Methods for Handling Data Streams in Presence of Concepts Drifts
Abstract
1 Introduction
2 Concept Drift in Real-World Applications
2.1 Real vs Virtual Drifts
2.2 Real World Applications
3 Methods for Adaptation of Concept Drifting Data Streams
3.1 Abrupt Forgetting
3.2 Gradual Forgetting
4 Learning Modes
5 Conclusion
References
Copy-Move Image Forgery Detection Using DCT and ORB Feature Set
Abstract
1 Introduction
2 Literature Review
3 Proposed Work
3.1 Preprocessing
3.2 Feature Extraction
3.3 Feature Matching
3.4 Post Processing
4 Experiment and Result Analysis
5 Conclusion
References
A Study of E-Healthcare System for Pregnant Women
Abstract
1 Introduction
2 Literature Review
2.1 Research Questions
3 Comparison of Various E-Healthcare Systems
4 Proposed Model Pregnancy E-Healthcare System
4.1 Tech Preg Wrist Band
4.2 Tech Preg Smart Shoes
4.3 Tech Preg Smart App
5 The Architecture of the Proposed Model
6 Conclusion and Future Perspective
References
Multi-modality Medical Image Fusion Using Fuzzy Local Information C-Means Clustering in SWT Domain
Abstract
1 Introduction
2 Fuzzy Local Information C-Means Clustering (FLICM)
3 Proposed Methodology
4 Results and Discussion
5 Conclusion
References
A Comparative Study on Machine Learning Techniques for Benzene Prediction
Abstract
1 Introduction
2 Review of Related Work
3 Machine Learning Based Air Quality Prediction Models
3.1 Linear Model
3.2 Artificial Neural Network
3.3 Decision Tree
3.4 Support Vector Machines (SVM)
3.5 K-Nearest Neighbor (K-NN)
4 Proposed Methodology
4.1 Proposed Ensemble Approach
5 Experimental Implementation
5.1 Dataset Description and Experimental Design
5.2 Experimental Setting
5.3 Performance Analysis
5.3.1 Performance Evaluation and Results
6 Comparative Analysis
6.1 Ensembling
6.2 Parameters Tuning
6.3 Processing Time
7 Conclusion and Future Perspective
References
Carcinoma Classification from Breast Histopathology Images Using a Multi Level Spatial Fusion Mechanism of Deep Convolutional Features from Differently Stain Normalized Patches
1 Introduction
2 Dataset
3 Methodology
3.1 Preprocessing
3.2 Patch Extraction
3.3 Patch Wise Classification
3.4 Image Wise Classification
4 Experiments
5 Conclusion
References
Predictive Modeling to Predict the Residency of Teachers Using Machine Learning for the Real-Time
Abstract
1 Introduction and Related Work
2 Research Methods
2.1 Preprocessing Dataset
2.2 Training, Testing, and Validation
2.3 Algorithms, Tool and Metrics
3 Experimental Analysis
3.1 Prediction with K-Fold
3.2 Prediction with Training Ratio
3.3 Prediction with Leave One Out
3.4 Prediction in Real-Time
4 Prediction Validation
5 Conclusion
Acknowledgment
References
Communication Technologies, Security and Privacy
Sybil Account Detection in Online Social Networks Using Statistical Feature Selection Techniques
Abstract
1 Introduction
2 Dataset
3 Experimental Setup
3.1 Data Pre-processing
3.2 Feature Selection
3.3 Models
3.4 Prediction and Evaluation Criteria
3.4.1 Confusion Metrics
3.4.2 Evaluation Metrics
4 Results and Analysis
5 Conclusion and Future Work
References
Performance Evaluation of Lung Segmentation Techniques in Computer Aided Lung Nodule Detection System
Abstract
1 Introduction
2 Lung Segmentation
3 Lung Segmentation Techniques
3.1 Thresholding Approach
3.2 Edge Based Segmentation Approach
3.3 Region Based Approach
3.4 Unsupervised Approach
3.5 Supervised Approach
3.6 Bayesian Approach
3.7 Graph Cut Approach
4 Proposed Algorithm
5 Experimental Results
6 Conclusion
Acknowledgment
References
Survey on Domain Name System Security Problems - DNS and Blockchain Solutions
1 Introduction to DNS
1.1 DNS Components
1.2 DNS Message Format
1.3 DNS Communication
2 DNS Threats
2.1 Packet Interception
2.2 Name Chaining
2.3 Denial of Service (DoS) and Distributed Denial of Service (DDoS)
2.4 Cache Poisoning
2.5 Dynamic DNS Update Vulnerabilities
3 Survey of DNS Security Solutions
3.1 Overview of DNSSEC
3.2 DNSCURVE - Overview
4 Blockchain Based DNS Security Solutions
4.1 Blockchain Naming Service (BNS)
4.2 Namecoin
4.3 Blockstack
4.4 ConsortiumDNS
5 Future Work
6 Conclusions
References
Hybrid Big Bang-Big Crunch Algorithm for Cluster Analysis
Abstract
1 Introduction
2 Related Work
3 Hybrid Big Bang-Big Crunch (HBB-BC) Algorithm for Cluster Analysis
3.1 Initialization
3.2 Optimization
4 Results and Discussion
4.1 Statistical Results and Discussion
5 Conclusion
References
Security Analysis of Cyber Attacks Using Machine Learning Algorithms in eGovernance Projects
Abstract
1 Introduction
2 Literature Review
3 Significance of the Research
4 Proposed Methodology
5 Conclusion
References
Techniques for Task Scheduling in Cloud and Fog Environment: A Survey
Abstract
1 Introduction
2 Task Scheduling
3 Related Works
4 Conclusion and Future Directions
References
Time Improvement of Smith-Waterman Algorithm Using OpenMP and SIMD
Abstract
1 Introduction
2 Sequence Alignment with Smith-Waterman Algorithm
3 Related Work
4 Methodology
4.1 Task Creation
4.2 Block Calculation
4.3 Backtracking
5 Results and Discussion
6 Conclusions and Future Work
References
Synchronization Safety Problem in Quantum Key Distribution System
Abstract
1 Introduction
2 Research Objective
2.1 Synchronization of Quantum Key Distribution Channel with Automatic Compensation of Polarization Distortions
2.2 The Process of Measuring the Propagation Time of the Synchronization Signal in Quantum Channel Between QKD Stations
2.3 The Relevance of the Problem of Protecting Self-compensation Quantum Key Distribution System
3 Principle of Synchronization with Protection from Unauthorized Access
4 Conclusion
Acknowledgements
References
Author Index
π SIMILAR VOLUMES
<span>This two-wolume set (CCIS 1395-1396) constitutes the refereed proceedings of the Third International Conference on Futuristic Trends in Network and Communication Technologies, FTNCT 2020, held in Taganrog, Russia, in October 2020.</span><p><span>The 80 revised full papers presented were carefu
<span>This book constitutes the refereed proceedings of the Second International Conference on Advances in Communication, Network, and Computing, CNC 2011, held in Bangalore, India, in March 2011. The 41 revised full papers, presented together with 50 short papers and 39 poster papers, were carefull
<p><p>This book constitutes the refereed proceedings of the First International Conference on Futuristic Trends in Network and Communication Technologies, FTNCT 2018, held in Solan, India, in February 2018.</p><p>The 37 revised full papers presented were carefully reviewed and selected from 239 subm
<p><span>This book constitutes the refereed proceedings of the Fourth International Conference on Futuristic Trends in Network and Communication Technologies, FTNCT 2021. The prime aim of the conference is to invite researchers from different domains of network and communication technologies to a si