This book constitutes the refereed proceedings of the First International EAI Conference on Emerging Technologies for Developing Countries, AFRICATEK 2017, held in Marrakech, Morocco, in March 2017. The 15 full papers, 5 short papers, 2 invited papers and one poster paper were selected from 41 submissions. The papers are organized thematically in tracks, starting with wireless sensor networks (WSNs), vehicular area networks (VANs) and mobile networks; IoT and cloud computing; big data, data analytics, and knowledge management; processing big data over diverse clouds; Web services and software engineering; security.…mehr
This book constitutes the refereed proceedings of the First International EAI Conference on Emerging Technologies for Developing Countries, AFRICATEK 2017, held in Marrakech, Morocco, in March 2017. The 15 full papers, 5 short papers, 2 invited papers and one poster paper were selected from 41 submissions. The papers are organized thematically in tracks, starting with wireless sensor networks (WSNs), vehicular area networks (VANs) and mobile networks; IoT and cloud computing; big data, data analytics, and knowledge management; processing big data over diverse clouds; Web services and software engineering; security.
Produktdetails
Produktdetails
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engi 20
Seamless WSN Connectivity using Diverse Wireless Links.- Mixed method: an aggregated method for handover decision in heterogeneous wireless networks.- Analysis of the impact of Cognitive Vehicular Network environment on Spectrum Sensing.- High availability of charging and Billing In Vehicular ad hoc Network.- Developing IoT to support the health sector: A case study.- Designing a Framework for Smart IoT Adaptations.- ABAC Based Online Collaborations in the Cloud Smart Energy and Disaster Management.- Evaluating Query Energy Consumption in Document Stores.- Joint energy demand prediction and control.- Trust Assessment-Based Multiple Linear Regression.- Opinions Sandbox: Turning emotions on topics into actionable analytics.- E-Healthcare Knowledge Creation Platform using Action Research.- Framework for Dynamic Web Services Composition Guided by Live Testing.- Modernization of legacy software tests to model-driven testing.- Porting the Pay with a (Group) Selfie (PGS) payment system to crypto currency.- Cloud Digital Forensics Evaluation and Crimes Detection.- Detecting Malware Domains: A Cyber-Threat Alarm System.- Intrusion Detection using an Unsupervised Approach.- Cloud computing and virtualization in developing countries.- Analysis and Effect of Feature Selection over Smartphonebased Dataset for Human Activity Recognition.- Designing an Electronic Health Security System Framework for authentication with Wi-Fi, Smartphone and 3D face recognition technology.- Investigating TOE Factors Affecting the Adoption of a Cloud-Based EMR System in the Free-State, South Africa.
Seamless WSN Connectivity using Diverse Wireless Links.- Mixed method: an aggregated method for handover decision in heterogeneous wireless networks.- Analysis of the impact of Cognitive Vehicular Network environment on Spectrum Sensing.- High availability of charging and Billing In Vehicular ad hoc Network.- Developing IoT to support the health sector: A case study.- Designing a Framework for Smart IoT Adaptations.- ABAC Based Online Collaborations in the Cloud Smart Energy and Disaster Management.- Evaluating Query Energy Consumption in Document Stores.- Joint energy demand prediction and control.- Trust Assessment-Based Multiple Linear Regression.- Opinions Sandbox: Turning emotions on topics into actionable analytics.- E-Healthcare Knowledge Creation Platform using Action Research.- Framework for Dynamic Web Services Composition Guided by Live Testing.- Modernization of legacy software tests to model-driven testing.- Porting the Pay with a (Group) Selfie (PGS) payment system to crypto currency.- Cloud Digital Forensics Evaluation and Crimes Detection.- Detecting Malware Domains: A Cyber-Threat Alarm System.- Intrusion Detection using an Unsupervised Approach.- Cloud computing and virtualization in developing countries.- Analysis and Effect of Feature Selection over Smartphonebased Dataset for Human Activity Recognition.- Designing an Electronic Health Security System Framework for authentication with Wi-Fi, Smartphone and 3D face recognition technology.- Investigating TOE Factors Affecting the Adoption of a Cloud-Based EMR System in the Free-State, South Africa.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826