This book gathers selected high-quality research papers presented at International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2022) organized by Pulchowk Campus, Institute of Engineering, Tribhuvan University, Nepal, during 27-28 January 2022. The book discusses recent developments in mobile communication technologies ranging from mobile edge computing devices, to personalized, embedded and sustainable applications. The book covers vital topics like mobile networks, computing models, algorithms, sustainable models and advanced informatics that supports the symbiosis of mobile computing and sustainable informatics.…mehr
This book gathers selected high-quality research papers presented at International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2022) organized by Pulchowk Campus, Institute of Engineering, Tribhuvan University, Nepal, during 27-28 January 2022. The book discusses recent developments in mobile communication technologies ranging from mobile edge computing devices, to personalized, embedded and sustainable applications. The book covers vital topics like mobile networks, computing models, algorithms, sustainable models and advanced informatics that supports the symbiosis of mobile computing and sustainable informatics.
Produktdetails
Produktdetails
Lecture Notes on Data Engineering and Communications Technologies 126
Dr. Professor Subarna Shakya is currently Professor of Computer Engineering, Department of Electronics and Computer Engineering, Central Campus, Institute of Engineering, Pulchowk, Tribhuvan University, Coordinator (IOE), LEADER Project (Links in Europe and Asia for engineering, eDucation, Enterprise and Research exchanges), ERASMUS MUNDUS. He received M.Sc. and Ph.D. degrees in Computer Engineering from the Lviv Polytechnic National University, Ukraine, 1996 and 2000. respectively. His research area includes E-Government system, computer systems and simulation, distributed and cloud computing, software engineering and information system, computer architecture, information security for E-Government and multimedia system. Dr. Klimis Ntalianis is Full Professor at the University of West Attica, Athens, GREECE. He has worked as Senior Researcher in multi-million research and development projects, funded by the General Secretariat of Research and Technology of Greece (GSRT), the Research Promotion Foundation of Cyprus (RPF), the Information Society S.A. of Greece and the European Union. He is also serving as Senior Project Proposal Evaluator for GSRT, RPF, the European Union, the Natural Sciences and Engineering Research Council of Canada and the National Science Center of Poland. In parallel, he is Member of several master theses and Ph.D. evaluation committees in Greece, Cyprus, Germany and India. He is also serving as Promotion Evaluator for Saudi Arabia's academic staff. He has served as General Chair in several conferences (IEEE, etc.). Dr. Ntalianis has published more than 160 scientific papers in international journals, books and conferences. His main research interests include social computing, multimedia analysis and information security. Dr. Khaled A. Kamel is currently Chairman and Professor at Texas Southern university, College of Science and technology, Department of Computer Science, Houston, TX. He has published many research articles in refereed journals and IEEE conferences. He has more than 30 years of teaching and research experience. He has been General chair, Session Chair, TPC Chair and Panelist in several conferences and acted as Reviewer and Guest Editor in referred journals. His research interest includes networks, computing and communication systems.
Inhaltsangabe
Chapter 1. XGBoost Design by Multi-verse Optimiser: An Application for Network Intrusion Detection.- Chapter 2. Gateway based Congestion Avoidance using Two-Hop Node in Wireless Sensor Networks.- Chapter 3. Stroke Prediction System using Machine Learning Algorithm.- Chapter 4. A Comprehensive Survey on Multilingual Opinion Mining.- Chapter 5. Development Features and Principles of Blockchain Technologies and Real Options as the Main Components of the Digital Economy.- Chapter 6. Technical Efficiency Analysis of China's Telecommunication Infrastructure :A Copula-based Meta-Stochastic Frontier Model.- Chapter 7. ATM Security using IRIS Recognition.- Chapter 8. Reliable Data Acquisition by Master Slave Approach in Marine-IoT Environment for Logistics.- Chapter 9. Mobile Technology Acceptance of University Students: A Consolidated Approach.- Chapter 10. Multistage Intrusion Detection System using Machine Learning Algorithm.- Chapter 11. Modeling Global Solar Radiation using Machine Learning with Model Selection Approach: a Case Study at Tanzania.- Chapter 12. Plant Disease Detection using Transfer Learning with DL Model.- Chapter 13. Tagging Fake Profiles in Twitter using Machine Learning Approach.- Chapter 14. A Machine-Learning System to Classify Cybercrime.- Chapter 15. Analyses of Non-Linear Effects with DCS and HOA Performance for 4 X 4 WDM / DWDM System. etc.
Chapter 1. XGBoost Design by Multi-verse Optimiser: An Application for Network Intrusion Detection.- Chapter 2. Gateway based Congestion Avoidance using Two-Hop Node in Wireless Sensor Networks.- Chapter 3. Stroke Prediction System using Machine Learning Algorithm.- Chapter 4. A Comprehensive Survey on Multilingual Opinion Mining.- Chapter 5. Development Features and Principles of Blockchain Technologies and Real Options as the Main Components of the Digital Economy.- Chapter 6. Technical Efficiency Analysis of China's Telecommunication Infrastructure :A Copula-based Meta-Stochastic Frontier Model.- Chapter 7. ATM Security using IRIS Recognition.- Chapter 8. Reliable Data Acquisition by Master Slave Approach in Marine-IoT Environment for Logistics.- Chapter 9. Mobile Technology Acceptance of University Students: A Consolidated Approach.- Chapter 10. Multistage Intrusion Detection System using Machine Learning Algorithm.- Chapter 11. Modeling Global Solar Radiation using Machine Learning with Model Selection Approach: a Case Study at Tanzania.- Chapter 12. Plant Disease Detection using Transfer Learning with DL Model.- Chapter 13. Tagging Fake Profiles in Twitter using Machine Learning Approach.- Chapter 14. A Machine-Learning System to Classify Cybercrime.- Chapter 15. Analyses of Non-Linear Effects with DCS and HOA Performance for 4 X 4 WDM / DWDM System. etc.
Chapter 1. XGBoost Design by Multi-verse Optimiser: An Application for Network Intrusion Detection.- Chapter 2. Gateway based Congestion Avoidance using Two-Hop Node in Wireless Sensor Networks.- Chapter 3. Stroke Prediction System using Machine Learning Algorithm.- Chapter 4. A Comprehensive Survey on Multilingual Opinion Mining.- Chapter 5. Development Features and Principles of Blockchain Technologies and Real Options as the Main Components of the Digital Economy.- Chapter 6. Technical Efficiency Analysis of China's Telecommunication Infrastructure :A Copula-based Meta-Stochastic Frontier Model.- Chapter 7. ATM Security using IRIS Recognition.- Chapter 8. Reliable Data Acquisition by Master Slave Approach in Marine-IoT Environment for Logistics.- Chapter 9. Mobile Technology Acceptance of University Students: A Consolidated Approach.- Chapter 10. Multistage Intrusion Detection System using Machine Learning Algorithm.- Chapter 11. Modeling Global Solar Radiation using Machine Learning with Model Selection Approach: a Case Study at Tanzania.- Chapter 12. Plant Disease Detection using Transfer Learning with DL Model.- Chapter 13. Tagging Fake Profiles in Twitter using Machine Learning Approach.- Chapter 14. A Machine-Learning System to Classify Cybercrime.- Chapter 15. Analyses of Non-Linear Effects with DCS and HOA Performance for 4 X 4 WDM / DWDM System. etc.
Chapter 1. XGBoost Design by Multi-verse Optimiser: An Application for Network Intrusion Detection.- Chapter 2. Gateway based Congestion Avoidance using Two-Hop Node in Wireless Sensor Networks.- Chapter 3. Stroke Prediction System using Machine Learning Algorithm.- Chapter 4. A Comprehensive Survey on Multilingual Opinion Mining.- Chapter 5. Development Features and Principles of Blockchain Technologies and Real Options as the Main Components of the Digital Economy.- Chapter 6. Technical Efficiency Analysis of China's Telecommunication Infrastructure :A Copula-based Meta-Stochastic Frontier Model.- Chapter 7. ATM Security using IRIS Recognition.- Chapter 8. Reliable Data Acquisition by Master Slave Approach in Marine-IoT Environment for Logistics.- Chapter 9. Mobile Technology Acceptance of University Students: A Consolidated Approach.- Chapter 10. Multistage Intrusion Detection System using Machine Learning Algorithm.- Chapter 11. Modeling Global Solar Radiation using Machine Learning with Model Selection Approach: a Case Study at Tanzania.- Chapter 12. Plant Disease Detection using Transfer Learning with DL Model.- Chapter 13. Tagging Fake Profiles in Twitter using Machine Learning Approach.- Chapter 14. A Machine-Learning System to Classify Cybercrime.- Chapter 15. Analyses of Non-Linear Effects with DCS and HOA Performance for 4 X 4 WDM / DWDM System. etc.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497