,

Ubiquitous Communications and Network Computing

Second EAI International Conference, Bangalore, India, February 8–10, 2019, Proceedings

Specificaties
Paperback, blz. | Engels
Springer International Publishing | e druk, 2019
ISBN13: 9783030206147
Rubricering
Juridisch :
Springer International Publishing e druk, 2019 9783030206147
€ 78,99
Levertijd ongeveer 9 werkdagen
Gratis verzonden

Samenvatting

This book constitutes the refereed proceedings of the Second International Conference on Ubiquitous Communications and Network Computing, UBICNET 2019, held in Bangalore, India, in February 2019. The 19 full papers were selected from 52 submissions and are basically arranged in different sessions on security and energy efficient computing, software defined networks, cloud computing and internet of things applications, and the advanced communication systems and networks.

Specificaties

ISBN13:9783030206147
Taal:Engels
Bindwijze:paperback
Uitgever:Springer International Publishing

Inhoudsopgave

Performance Analysis of Femtocell on Channel Allocation.- System Level Performance Analysis of designed LNA and Down Converter for IEEE 802.11ad Receiver.- Optimizing the Wi-Fi Mesh Networks for Throughput Improvement.- Direction finding capability in Bluetooth 5.1 standard.- An investigation of transmission properties of double-exponential pulses in core-clad optical fibers for communication application.- Hybrid Energy Efficient and QoS Aware Algorithm to Prolong IoT Network Lifetime.- Data Integration and Management in Indian Poultry Sector.- CA-RPL: A Clustered Additive Approach in RPL for IoT Based Scalable Networks.- Implementation of Trilateration based Localization approach for tree monitoring in IoT.- Expert System Design for Automated Prediction of Difficulties in Securing Airway in ICU and OT.- A comparative study on load balancing algorithms in software defined networking.- CloudSDN: Enabling SDN Framework for Security and Threat Analytics in Cloud Networks.- NB-FTBM Model for Entity Trust Evaluation in Vehicular Ad Hoc Network Security.- Threshold Cryptography based Light Weight Key Management Technique for Hierarchical WSNs.- Denoising Epigraphical Estampages using Nested Run Length Count.- Improving transition probability for detecting Hardware Trojan using weighted random patterns.- Prefix tree based MapReduce approach for mining frequent subgraphs.- A Taxonomy of Methods and Models used in Program Transformation and Parallelization.- Time Bound Robot Mission Planning for Priority Machine Using Linear Temporal Logic for Multi Goals.

Net verschenen

€ 78,99
Levertijd ongeveer 9 werkdagen
Gratis verzonden

Rubrieken

    Personen

      Trefwoorden

        Ubiquitous Communications and Network Computing