E-Book Overview
This book collects articles presented at the 13th International Conference on Information Technology- New Generations, April, 2016, in Las Vegas, NV USA. It includes over 100 chapters on critical areas of IT including Web Technology, Communications, Security, and Data Mining.
E-Book Information
-
Series: Advances in Intelligent Systems and Computing 448
-
Year: 2,016
-
Edition: 1
-
Pages: XXI, 1306
-
Pages In File: 1,253
-
Language: English
-
Identifier: 978-3-319-32466-1, 978-3-319-32467-8
-
Doi: 10.1007/978-3-319-32467-8
-
Org File Size: 59,822,965
-
Extension: pdf
-
Tags: Information Systems and Communication Service Data Structures, Cryptology and Information Theory Systems and Data Security
-
Toc: Front Matter....Pages i-xxiFront Matter....Pages 1-1Understanding User’s Acceptance of Personal Cloud Computing: Using the Technology Acceptance Model....Pages 3-12Cognitive Spectrum Decision via Machine Learning in CRN....Pages 13-23Elastic Edge-Overlay Methods Using OpenFlow for Cloud Networks....Pages 25-37An Approach to Generate Automatic Variable Key to Assure Perfect Security in Cryptosystem....Pages 39-45Airborne Networks with Multi-beam Smart Antennas: Towards a QOS-Supported, Mobility-Predictive MAC....Pages 47-57CR Based Video Communication Testbed with Robust Spectrum Sensing / Handoff....Pages 59-70A Control-Message Quenching Algorithm in Openflow-Based Wireless Mesh Networks with Dynamic Spectrum Access....Pages 71-81SINR Maximization in Relay-Assisted Multi-user Wireless Networks....Pages 83-90A Hybrid MAC for Long-Distance Mesh Network with Multi-beam Antennas....Pages 91-100Future Approach to Find Business Model Orientation for Technological Businesses....Pages 101-110Social Media Coverage of Public Health Issues in China: A Content Analysis of Weibo News Posts....Pages 111-120Advertisement Through the Most Popular Twitter Users Based on Followers in Saudi Arabia....Pages 121-130Sentiment Analysis for Arabic Reviews in Social Networks Using Machine Learning....Pages 131-139Front Matter....Pages 141-141An Interactive Model for Creating Awareness and Consequences of Cyber-crime in People with Limited Technology Skills....Pages 143-149Power Analysis Attack and Its Countermeasure for a Lightweight Block Cipher Simon....Pages 151-160Perpetuating Biometrics for Authentication....Pages 161-176Certificate-Based IP Multimedia Subsystem Authentication and Key Agreement....Pages 177-188Software Optimizations of NTRUEncrypt for Modern Processor Architectures....Pages 189-199Vulnerabilities and Mitigation Methods in the NextGen Air Traffic Control System....Pages 201-211Pushing the Limits of Cyber Threat Intelligence: Extending STIX to Support Complex Patterns....Pages 213-225Front Matter....Pages 141-141Analyzing Packet Forwarding Schemes for Selfish Behavior in MANETs....Pages 227-236Speed Records for Multi-prime RSA Using AVX2 Architectures....Pages 237-245Privacy Pr