Data, Engineering and Applications (eBook, PDF)
Volume 2
96,29 €
inkl. MwSt.
Sofort per Download lieferbar
Data, Engineering and Applications (eBook, PDF)
Volume 2
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book presents a compilation of current trends, technologies, and challenges in connection with Big Data. Many fields of science and engineering are data-driven, or generate huge amounts of data that are ripe for the picking. There are now more sources of data than ever before, and more means of capturing data. At the same time, the sheer volume and complexity of the data have sparked new developments, where many Big Data problems require new solutions. Given its scope, the book offers a valuable reference guide for all graduate students, researchers, and scientists interested in exploring the potential of Big Data applications.…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 12.42MB
- Upload möglich
Andere Kunden interessierten sich auch für
- Data, Engineering and Applications (eBook, PDF)96,29 €
- Shiliang SunMultiview Machine Learning (eBook, PDF)139,09 €
- Radu Tudor IonescuKnowledge Transfer between Computer Vision and Text Mining (eBook, PDF)96,29 €
- Recommender Systems in Fashion and Retail (eBook, PDF)85,59 €
- Tom TaulliGrundlagen der Künstlichen Intelligenz (eBook, PDF)19,99 €
- Applications of Data Management and Analysis (eBook, PDF)96,29 €
- Data Mining for Business Applications (eBook, PDF)96,29 €
-
-
-
This book presents a compilation of current trends, technologies, and challenges in connection with Big Data. Many fields of science and engineering are data-driven, or generate huge amounts of data that are ripe for the picking. There are now more sources of data than ever before, and more means of capturing data. At the same time, the sheer volume and complexity of the data have sparked new developments, where many Big Data problems require new solutions. Given its scope, the book offers a valuable reference guide for all graduate students, researchers, and scientists interested in exploring the potential of Big Data applications.
Produktdetails
- Produktdetails
- Verlag: Springer Singapore
- Erscheinungstermin: 24. April 2019
- Englisch
- ISBN-13: 9789811363511
- Artikelnr.: 56813312
- Verlag: Springer Singapore
- Erscheinungstermin: 24. April 2019
- Englisch
- ISBN-13: 9789811363511
- Artikelnr.: 56813312
Dr Rajesh K Shukla is a Professor and Head of the Department of Computer Science and Engineering, SIRT, Bhopal, India. With more than 20 years of teaching and research experience he has authored 8 books and has published/presented has more than 40 papers in international journals and conferences. Dr Shukla received an ISTE U.P. Government National Award in 2015 and various prestigious awards from the Computer Society of India. His research interests include recommendation systems and machine learning. He is fellow of IETE, a senior member of IEEE, a life member of ISTE, ISCA, and a member of ACM and IE(I).
Dr Jitendra Agrawal is a faculty member in the Department of Computer Science & Engineering, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, India. His research interests include data mining and computational intelligence. He has authored 02 books and published more than 60 papers in international journals and conferences.Dr Agrawal is a senior member of IEEE, life member of CSI, ISTE and member of IAENG. He has served as part of the program committees for several international conferences organised in countries such as the USA, India, New Zealand, Korea, Indonesia and Thailand.
Dr Sanjeev Sharma is a Professor and Head of the School of Information Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, MP, India. He has over 29 years of teaching and research experience and received the World Education Congress Best Teacher Award in Information Technology. His research interests include mobile computing, ad-hoc networks, image processing and information security. He has edited proceedings of several national and international conferences and published more than 150 research papers in reputed journals. He is a member of IEEE, CSI, ISTE and IAENG.
Dr G S Tomer is the Director of THDC Institute of Hydropower Engineering and Technology (Government of Uttarakhand), Tehri, India. He received the International Plato award for Educational Achievements in 2009. He completed his doctorate in Electronics Engineering from RGPV Bhopal and postdoctorate from the University of Kent, United Kingdom. Dr Tomar has more than 30 years of teaching and research experience and has published over 200 research papers in reputed journals, as well as 11 books and 7 book chapters. He is a senior member of IEEE, ACM and IACSIT, a fellow of IETE and IE(I), and a member of CSI and ISTE. He has also edited the proceedings of more than 20 IEEE conferences and has been the general chair of over 30 Conferences.
Dr Jitendra Agrawal is a faculty member in the Department of Computer Science & Engineering, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, India. His research interests include data mining and computational intelligence. He has authored 02 books and published more than 60 papers in international journals and conferences.Dr Agrawal is a senior member of IEEE, life member of CSI, ISTE and member of IAENG. He has served as part of the program committees for several international conferences organised in countries such as the USA, India, New Zealand, Korea, Indonesia and Thailand.
Dr Sanjeev Sharma is a Professor and Head of the School of Information Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, MP, India. He has over 29 years of teaching and research experience and received the World Education Congress Best Teacher Award in Information Technology. His research interests include mobile computing, ad-hoc networks, image processing and information security. He has edited proceedings of several national and international conferences and published more than 150 research papers in reputed journals. He is a member of IEEE, CSI, ISTE and IAENG.
Dr G S Tomer is the Director of THDC Institute of Hydropower Engineering and Technology (Government of Uttarakhand), Tehri, India. He received the International Plato award for Educational Achievements in 2009. He completed his doctorate in Electronics Engineering from RGPV Bhopal and postdoctorate from the University of Kent, United Kingdom. Dr Tomar has more than 30 years of teaching and research experience and has published over 200 research papers in reputed journals, as well as 11 books and 7 book chapters. He is a senior member of IEEE, ACM and IACSIT, a fellow of IETE and IE(I), and a member of CSI and ISTE. He has also edited the proceedings of more than 20 IEEE conferences and has been the general chair of over 30 Conferences.
Efficient Map-Reduce Framework Using Summation.- Secret image sharing over cloud using one dimensional chaotic map.- Design and Development of a Cloud-based Electronic Medical Records (EMR) System.- Implementation of a secure Cloud computing authentication using Elliptic curve Cryptography.- Log-based Approach for Security Implementation in Cloud CRM’s.- Performance Analysis of Scheduling Algorithms in Apache Hadoop.- Energy Aware Prediction Based Load Balancing Approach with VM Migration for the Cloud Environment.- Authentication Process using Secure Sum for a New Node in Mobile Ad Hoc Network.- Certificate Revocation in Hybrid Ad-hoc Network.- NB tree based Intrusion detection technique using Rough set theory model.- An Energy Efficient Intrusion Detection System For Manet.- DDoS Attack Mitigation using Random and Flow Based Scheme.- Digital Image Watermarking Against Geometrical Attack.- Efficient key Management Approach for Vehicular Ad-hoc Network.- Image Forgery Detection: Survey and Future directions.- Comparative Study of Digital Forensic Tools.- A Systematic Survey on Mobile Forensic tools used for Forensic Analysis of Android based Social Networking Applications.- Enhanced and Secure Acknowledgement IDS in Mobile Adhoc Network by Hybrid Cryptography Technique.- Formal Verification of Causal Order Based Load Distribution Mechanism Using Event-B
Efficient Map-Reduce Framework Using Summation.- Secret image sharing over cloud using one dimensional chaotic map.- Design and Development of a Cloud-based Electronic Medical Records (EMR) System.- Implementation of a secure Cloud computing authentication using Elliptic curve Cryptography.- Log-based Approach for Security Implementation in Cloud CRM's.- Performance Analysis of Scheduling Algorithms in Apache Hadoop.- Energy Aware Prediction Based Load Balancing Approach with VM Migration for the Cloud Environment.- Authentication Process using Secure Sum for a New Node in Mobile Ad Hoc Network.- Certificate Revocation in Hybrid Ad-hoc Network.- NB tree based Intrusion detection technique using Rough set theory model.- An Energy Efficient Intrusion Detection System For Manet.- DDoS Attack Mitigation using Random and Flow Based Scheme.- Digital Image Watermarking Against Geometrical Attack.- Efficient key Management Approach for Vehicular Ad-hoc Network.- Image Forgery Detection: Survey and Future directions.- Comparative Study of Digital Forensic Tools.- A Systematic Survey on Mobile Forensic tools used for Forensic Analysis of Android based Social Networking Applications.- Enhanced and Secure Acknowledgement IDS in Mobile Adhoc Network by Hybrid Cryptography Technique.- Formal Verification of Causal Order Based Load Distribution Mechanism Using Event-B
Efficient Map-Reduce Framework Using Summation.- Secret image sharing over cloud using one dimensional chaotic map.- Design and Development of a Cloud-based Electronic Medical Records (EMR) System.- Implementation of a secure Cloud computing authentication using Elliptic curve Cryptography.- Log-based Approach for Security Implementation in Cloud CRM’s.- Performance Analysis of Scheduling Algorithms in Apache Hadoop.- Energy Aware Prediction Based Load Balancing Approach with VM Migration for the Cloud Environment.- Authentication Process using Secure Sum for a New Node in Mobile Ad Hoc Network.- Certificate Revocation in Hybrid Ad-hoc Network.- NB tree based Intrusion detection technique using Rough set theory model.- An Energy Efficient Intrusion Detection System For Manet.- DDoS Attack Mitigation using Random and Flow Based Scheme.- Digital Image Watermarking Against Geometrical Attack.- Efficient key Management Approach for Vehicular Ad-hoc Network.- Image Forgery Detection: Survey and Future directions.- Comparative Study of Digital Forensic Tools.- A Systematic Survey on Mobile Forensic tools used for Forensic Analysis of Android based Social Networking Applications.- Enhanced and Secure Acknowledgement IDS in Mobile Adhoc Network by Hybrid Cryptography Technique.- Formal Verification of Causal Order Based Load Distribution Mechanism Using Event-B
Efficient Map-Reduce Framework Using Summation.- Secret image sharing over cloud using one dimensional chaotic map.- Design and Development of a Cloud-based Electronic Medical Records (EMR) System.- Implementation of a secure Cloud computing authentication using Elliptic curve Cryptography.- Log-based Approach for Security Implementation in Cloud CRM's.- Performance Analysis of Scheduling Algorithms in Apache Hadoop.- Energy Aware Prediction Based Load Balancing Approach with VM Migration for the Cloud Environment.- Authentication Process using Secure Sum for a New Node in Mobile Ad Hoc Network.- Certificate Revocation in Hybrid Ad-hoc Network.- NB tree based Intrusion detection technique using Rough set theory model.- An Energy Efficient Intrusion Detection System For Manet.- DDoS Attack Mitigation using Random and Flow Based Scheme.- Digital Image Watermarking Against Geometrical Attack.- Efficient key Management Approach for Vehicular Ad-hoc Network.- Image Forgery Detection: Survey and Future directions.- Comparative Study of Digital Forensic Tools.- A Systematic Survey on Mobile Forensic tools used for Forensic Analysis of Android based Social Networking Applications.- Enhanced and Secure Acknowledgement IDS in Mobile Adhoc Network by Hybrid Cryptography Technique.- Formal Verification of Causal Order Based Load Distribution Mechanism Using Event-B