Information Technology: New Generations: 13th International Conference On Information Technology

E-Book Overview

This book collects articles presented at the 13th International Conference on Information Technology- New Generations, April, 2016, in Las Vegas, NV USA. It includes over 100 chapters on critical areas of IT including Web Technology, Communications, Security, and Data Mining.


E-Book Information

  • Series: Advances in Intelligent Systems and Computing 448

  • Year: 2,016

  • Edition: 1

  • Pages: XXI, 1306

  • Pages In File: 1,253

  • Language: English

  • Identifier: 978-3-319-32466-1, 978-3-319-32467-8

  • Doi: 10.1007/978-3-319-32467-8

  • Org File Size: 59,822,965

  • Extension: pdf

  • Tags: Information Systems and Communication Service Data Structures, Cryptology and Information Theory Systems and Data Security

  • Toc: Front Matter....Pages i-xxi Front Matter....Pages 1-1 Understanding User’s Acceptance of Personal Cloud Computing: Using the Technology Acceptance Model....Pages 3-12 Cognitive Spectrum Decision via Machine Learning in CRN....Pages 13-23 Elastic Edge-Overlay Methods Using OpenFlow for Cloud Networks....Pages 25-37 An Approach to Generate Automatic Variable Key to Assure Perfect Security in Cryptosystem....Pages 39-45 Airborne Networks with Multi-beam Smart Antennas: Towards a QOS-Supported, Mobility-Predictive MAC....Pages 47-57 CR Based Video Communication Testbed with Robust Spectrum Sensing / Handoff....Pages 59-70 A Control-Message Quenching Algorithm in Openflow-Based Wireless Mesh Networks with Dynamic Spectrum Access....Pages 71-81 SINR Maximization in Relay-Assisted Multi-user Wireless Networks....Pages 83-90 A Hybrid MAC for Long-Distance Mesh Network with Multi-beam Antennas....Pages 91-100 Future Approach to Find Business Model Orientation for Technological Businesses....Pages 101-110 Social Media Coverage of Public Health Issues in China: A Content Analysis of Weibo News Posts....Pages 111-120 Advertisement Through the Most Popular Twitter Users Based on Followers in Saudi Arabia....Pages 121-130 Sentiment Analysis for Arabic Reviews in Social Networks Using Machine Learning....Pages 131-139 Front Matter....Pages 141-141 An Interactive Model for Creating Awareness and Consequences of Cyber-crime in People with Limited Technology Skills....Pages 143-149 Power Analysis Attack and Its Countermeasure for a Lightweight Block Cipher Simon....Pages 151-160 Perpetuating Biometrics for Authentication....Pages 161-176 Certificate-Based IP Multimedia Subsystem Authentication and Key Agreement....Pages 177-188 Software Optimizations of NTRUEncrypt for Modern Processor Architectures....Pages 189-199 Vulnerabilities and Mitigation Methods in the NextGen Air Traffic Control System....Pages 201-211 Pushing the Limits of Cyber Threat Intelligence: Extending STIX to Support Complex Patterns....Pages 213-225 Front Matter....Pages 141-141 Analyzing Packet Forwarding Schemes for Selfish Behavior in MANETs....Pages 227-236 Speed Records for Multi-prime RSA Using AVX2 Architectures....Pages 237-245 Privacy Pr

You might also like


международное таможенное сотрудничество
Authors: Афонин П.Н. , Филиппенко С.В. , Яргина Н.Ю.    322    0



основы теории эволюционных вычислений: [монография]
Authors: В. М. Курейчик [и др.] ; М-во образования и науки Российской Федерации , Федеральное гос. авт. образовательное учреждение высш. проф. образования "Южный федеральный ун-т" , Технологический ин-т , г. Таганрог    331    0


Draw In Pencil, Charcoal, Crayon & Other Media
Authors: Hans Schwarz    170    0


Model Railroad Scenery And Detailing
Authors: Albert A. Sorensen    115    0



вестник липецкого государственного технического университета (вестник лгту). № 4 (26). 2015 г.
Authors: Шмырин Анатолий Михайлович , Володин Игорь Михайлович    394    0