Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Ubiquitous Communications and Networ...
~
Venkatesha Prasad, R.
Ubiquitous Communications and Network Computing = Second EAI International Conference, Bangalore, India, February 8–10, 2019, Proceedings /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Ubiquitous Communications and Network Computing/ edited by Navin Kumar, R. Venkatesha Prasad.
Reminder of title:
Second EAI International Conference, Bangalore, India, February 8–10, 2019, Proceedings /
other author:
Kumar, Navin.
Description:
XII, 265 p. 154 illus., 109 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Artificial intelligence. -
Online resource:
https://doi.org/10.1007/978-3-030-20615-4
ISBN:
9783030206154
Ubiquitous Communications and Network Computing = Second EAI International Conference, Bangalore, India, February 8–10, 2019, Proceedings /
Ubiquitous Communications and Network Computing
Second EAI International Conference, Bangalore, India, February 8–10, 2019, Proceedings /[electronic resource] :edited by Navin Kumar, R. Venkatesha Prasad. - 1st ed. 2019. - XII, 265 p. 154 illus., 109 illus. in color.online resource. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,2761867-8211 ;. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,154.
Performance Analysis of Femtocell on Channel Allocation -- System Level Performance Analysis of designed LNA and Down Converter for IEEE 802.11ad Receiver -- Optimizing the Wi-Fi Mesh Networks for Throughput Improvement -- Direction finding capability in Bluetooth 5.1 standard -- An investigation of transmission properties of double-exponential pulses in core-clad optical fibers for communication application -- Hybrid Energy Efficient and QoS Aware Algorithm to Prolong IoT Network Lifetime -- Data Integration and Management in Indian Poultry Sector -- CA-RPL: A Clustered Additive Approach in RPL for IoT Based Scalable Networks -- Implementation of Trilateration based Localization approach for tree monitoring in IoT -- Expert System Design for Automated Prediction of Difficulties in Securing Airway in ICU and OT -- A comparative study on load balancing algorithms in software defined networking -- CloudSDN: Enabling SDN Framework for Security and Threat Analytics in Cloud Networks -- NB-FTBM Model for Entity Trust Evaluation in Vehicular Ad Hoc Network Security -- Threshold Cryptography based Light Weight Key Management Technique for Hierarchical WSNs -- Denoising Epigraphical Estampages using Nested Run Length Count -- Improving transition probability for detecting Hardware Trojan using weighted random patterns -- Prefix tree based MapReduce approach for mining frequent subgraphs -- A Taxonomy of Methods and Models used in Program Transformation and Parallelization -- Time Bound Robot Mission Planning for Priority Machine Using Linear Temporal Logic for Multi Goals.
This book constitutes the refereed proceedings of the Second International Conference on Ubiquitous Communications and Network Computing, UBICNET 2019, held in Bangalore, India, in February 2019. The 19 full papers were selected from 52 submissions and are basically arranged in different sessions on security and energy efficient computing, software defined networks, cloud computing and internet of things applications, and the advanced communication systems and networks.
ISBN: 9783030206154
Standard No.: 10.1007/978-3-030-20615-4doiSubjects--Topical Terms:
559380
Artificial intelligence.
LC Class. No.: Q334-342
Dewey Class. No.: 006.3
Ubiquitous Communications and Network Computing = Second EAI International Conference, Bangalore, India, February 8–10, 2019, Proceedings /
LDR
:03641nam a22004095i 4500
001
1013649
003
DE-He213
005
20200705090725.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030206154
$9
978-3-030-20615-4
024
7
$a
10.1007/978-3-030-20615-4
$2
doi
035
$a
978-3-030-20615-4
050
4
$a
Q334-342
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
245
1 0
$a
Ubiquitous Communications and Network Computing
$h
[electronic resource] :
$b
Second EAI International Conference, Bangalore, India, February 8–10, 2019, Proceedings /
$c
edited by Navin Kumar, R. Venkatesha Prasad.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XII, 265 p. 154 illus., 109 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-8211 ;
$v
276
505
0
$a
Performance Analysis of Femtocell on Channel Allocation -- System Level Performance Analysis of designed LNA and Down Converter for IEEE 802.11ad Receiver -- Optimizing the Wi-Fi Mesh Networks for Throughput Improvement -- Direction finding capability in Bluetooth 5.1 standard -- An investigation of transmission properties of double-exponential pulses in core-clad optical fibers for communication application -- Hybrid Energy Efficient and QoS Aware Algorithm to Prolong IoT Network Lifetime -- Data Integration and Management in Indian Poultry Sector -- CA-RPL: A Clustered Additive Approach in RPL for IoT Based Scalable Networks -- Implementation of Trilateration based Localization approach for tree monitoring in IoT -- Expert System Design for Automated Prediction of Difficulties in Securing Airway in ICU and OT -- A comparative study on load balancing algorithms in software defined networking -- CloudSDN: Enabling SDN Framework for Security and Threat Analytics in Cloud Networks -- NB-FTBM Model for Entity Trust Evaluation in Vehicular Ad Hoc Network Security -- Threshold Cryptography based Light Weight Key Management Technique for Hierarchical WSNs -- Denoising Epigraphical Estampages using Nested Run Length Count -- Improving transition probability for detecting Hardware Trojan using weighted random patterns -- Prefix tree based MapReduce approach for mining frequent subgraphs -- A Taxonomy of Methods and Models used in Program Transformation and Parallelization -- Time Bound Robot Mission Planning for Priority Machine Using Linear Temporal Logic for Multi Goals.
520
$a
This book constitutes the refereed proceedings of the Second International Conference on Ubiquitous Communications and Network Computing, UBICNET 2019, held in Bangalore, India, in February 2019. The 19 full papers were selected from 52 submissions and are basically arranged in different sessions on security and energy efficient computing, software defined networks, cloud computing and internet of things applications, and the advanced communication systems and networks.
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computer organization.
$3
596298
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computer system failures.
$3
782237
650
1 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
System Performance and Evaluation.
$3
669346
700
1
$a
Kumar, Navin.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1101773
700
1
$a
Venkatesha Prasad, R.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1226857
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030206147
776
0 8
$i
Printed edition:
$z
9783030206161
830
0
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-8211 ;
$v
154
$3
1253880
856
4 0
$u
https://doi.org/10.1007/978-3-030-20615-4
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login