Information Technology: New Generations: 13th International Conference On Information Technology

Preparing link to download Please wait... Attached file not found

E-Book Overview

This book collects articles presented at the 13th International Conference on Information Technology- New Generations, April, 2016, in Las Vegas, NV USA. It includes over 100 chapters on critical areas of IT including Web Technology, Communications, Security, and Data Mining.


E-Book Information

  • Series: Advances in Intelligent Systems and Computing 448

  • Year: 2,016

  • Edition: 1

  • Pages: XXI, 1306

  • Pages In File: 1,253

  • Language: English

  • Identifier: 978-3-319-32466-1, 978-3-319-32467-8

  • Doi: 10.1007/978-3-319-32467-8

  • Org File Size: 59,822,965

  • Extension: pdf

  • Tags: Information Systems and Communication Service Data Structures, Cryptology and Information Theory Systems and Data Security

  • Toc: Front Matter....Pages i-xxiFront Matter....Pages 1-1Understanding User’s Acceptance of Personal Cloud Computing: Using the Technology Acceptance Model....Pages 3-12Cognitive Spectrum Decision via Machine Learning in CRN....Pages 13-23Elastic Edge-Overlay Methods Using OpenFlow for Cloud Networks....Pages 25-37An Approach to Generate Automatic Variable Key to Assure Perfect Security in Cryptosystem....Pages 39-45Airborne Networks with Multi-beam Smart Antennas: Towards a QOS-Supported, Mobility-Predictive MAC....Pages 47-57CR Based Video Communication Testbed with Robust Spectrum Sensing / Handoff....Pages 59-70A Control-Message Quenching Algorithm in Openflow-Based Wireless Mesh Networks with Dynamic Spectrum Access....Pages 71-81SINR Maximization in Relay-Assisted Multi-user Wireless Networks....Pages 83-90A Hybrid MAC for Long-Distance Mesh Network with Multi-beam Antennas....Pages 91-100Future Approach to Find Business Model Orientation for Technological Businesses....Pages 101-110Social Media Coverage of Public Health Issues in China: A Content Analysis of Weibo News Posts....Pages 111-120Advertisement Through the Most Popular Twitter Users Based on Followers in Saudi Arabia....Pages 121-130Sentiment Analysis for Arabic Reviews in Social Networks Using Machine Learning....Pages 131-139Front Matter....Pages 141-141An Interactive Model for Creating Awareness and Consequences of Cyber-crime in People with Limited Technology Skills....Pages 143-149Power Analysis Attack and Its Countermeasure for a Lightweight Block Cipher Simon....Pages 151-160Perpetuating Biometrics for Authentication....Pages 161-176Certificate-Based IP Multimedia Subsystem Authentication and Key Agreement....Pages 177-188Software Optimizations of NTRUEncrypt for Modern Processor Architectures....Pages 189-199Vulnerabilities and Mitigation Methods in the NextGen Air Traffic Control System....Pages 201-211Pushing the Limits of Cyber Threat Intelligence: Extending STIX to Support Complex Patterns....Pages 213-225Front Matter....Pages 141-141Analyzing Packet Forwarding Schemes for Selfish Behavior in MANETs....Pages 227-236Speed Records for Multi-prime RSA Using AVX2 Architectures....Pages 237-245Privacy Pr