Mobile Computing and Sustainable Informatics (eBook, PDF)
Proceedings of ICMCSI 2021
255,73 €
inkl. MwSt.
Sofort per Download lieferbar
Mobile Computing and Sustainable Informatics (eBook, PDF)
Proceedings of ICMCSI 2021
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book gathers selected high-quality research papers presented at International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2021) organized by Pulchowk Campus, Institute of Engineering, Tribhuvan University, Nepal, during 29–30 January 2021. The book discusses recent developments in mobile communication technologies ranging from mobile edge computing devices, to personalized, embedded and sustainable applications. The book covers vital topics like mobile networks, computing models, algorithms, sustainable models and advanced informatics that supports the symbiosis of mobile computing and sustainable informatics.…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 22.09MB
- Upload möglich
Andere Kunden interessierten sich auch für
- Mobile Computing and Sustainable Informatics (eBook, PDF)234,33 €
- Mobile Computing and Sustainable Informatics (eBook, PDF)255,73 €
- Proceedings of the Sixth International Conference on Mathematics and Computing (eBook, PDF)213,99 €
- Second International Conference on Sustainable Technologies for Computational Intelligence (eBook, PDF)223,63 €
- Computational Intelligence in Pattern Recognition (eBook, PDF)223,63 €
- Advances in Data Computing, Communication and Security (eBook, PDF)234,33 €
- Recent Innovations in Computing (eBook, PDF)223,63 €
-
-
-
This book gathers selected high-quality research papers presented at International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2021) organized by Pulchowk Campus, Institute of Engineering, Tribhuvan University, Nepal, during 29–30 January 2021. The book discusses recent developments in mobile communication technologies ranging from mobile edge computing devices, to personalized, embedded and sustainable applications. The book covers vital topics like mobile networks, computing models, algorithms, sustainable models and advanced informatics that supports the symbiosis of mobile computing and sustainable informatics.
Produktdetails
- Produktdetails
- Verlag: Springer Singapore
- Erscheinungstermin: 22. Juli 2021
- Englisch
- ISBN-13: 9789811618666
- Artikelnr.: 62288182
- Verlag: Springer Singapore
- Erscheinungstermin: 22. Juli 2021
- Englisch
- ISBN-13: 9789811618666
- Artikelnr.: 62288182
Dr. Prof. Subarna Shakya is currently Professor of Computer Engineering, Department of Electronics and Computer Engineering, Central Campus, Institute of Engineering, Pulchowk, Tribhuvan University, and Coordinator (IOE), LEADER Project (Links in Europe and Asia for engineering, eDucation, Enterprise and Research exchanges), ERASMUS MUNDUS. He received M.Sc. and Ph.D. degrees in Computer Engineering from the Lviv Polytechnic National University, Ukraine, 1996 and 2000, respectively. His research area includes government system, computer systems & simulation, distributed & cloud computing, software engineering & information system, computer architecture, information security for e-government and multimedia systems.
Robert Bestak received the Ph.D. degree in Computer Science from ENST Paris, France (2003), and M.Sc. degree in Telecommunications from Czech Technical University in Prague, CTU, Czech Republic (1999). Since 2004, he has been Assistant Professor at the Department of Telecommunication Engineering, Faculty of Electrical Engineering, CTU. He took part in several national, EU and third-party research projects. He is Czech Representative in the IFIP TC6 organization and Vice-Chair of working group TC6 WG6.8. He serves as a Steering and Technical Program Committee member of many IEEE/IFIP conferences (Networking, WMNC, NGMAST, etc.), and he is a member of the editorial board of several international journals (Computers & Electrical Engineering, Electronic Commerce Research Journal, etc.). His research interests include 5G networks, spectrum management and big data in mobile networks.
Prof. Ram Palanisamy Ramaraj Palanisamy is Professor of Enterprise Systems at the Gerald Schwartz School of Business, St. Francis Xavier University, Canada. He obtained his Ph.D. in information systems management from Indian Institute of Technology (IIT), New Delhi, India. He had academic positions at Wayne State University, Detroit, USA; University Telekom Malaysia; and National Institute of Technology, Tiruchirappalli, India. Palanisamy’s research has appeared in several peer-reviewed articles in several journals, edited books and conference proceedings.
Dr. Khaled A. Kamel is currently Chairman and Professor at Texas Southern University, College of Science and Technology, Department of Computer Science, Houston, TX. He has published many research articles in refereed journals and IEEE conferences. He has more than 30 years of teaching and research experience. He has been General Chair, Session Chair, TPC Chair and Panelist in several conferences and acted as Reviewer and Guest Editor in referred journals. His research interest includes networks, computing and communication systems.
Robert Bestak received the Ph.D. degree in Computer Science from ENST Paris, France (2003), and M.Sc. degree in Telecommunications from Czech Technical University in Prague, CTU, Czech Republic (1999). Since 2004, he has been Assistant Professor at the Department of Telecommunication Engineering, Faculty of Electrical Engineering, CTU. He took part in several national, EU and third-party research projects. He is Czech Representative in the IFIP TC6 organization and Vice-Chair of working group TC6 WG6.8. He serves as a Steering and Technical Program Committee member of many IEEE/IFIP conferences (Networking, WMNC, NGMAST, etc.), and he is a member of the editorial board of several international journals (Computers & Electrical Engineering, Electronic Commerce Research Journal, etc.). His research interests include 5G networks, spectrum management and big data in mobile networks.
Prof. Ram Palanisamy Ramaraj Palanisamy is Professor of Enterprise Systems at the Gerald Schwartz School of Business, St. Francis Xavier University, Canada. He obtained his Ph.D. in information systems management from Indian Institute of Technology (IIT), New Delhi, India. He had academic positions at Wayne State University, Detroit, USA; University Telekom Malaysia; and National Institute of Technology, Tiruchirappalli, India. Palanisamy’s research has appeared in several peer-reviewed articles in several journals, edited books and conference proceedings.
Dr. Khaled A. Kamel is currently Chairman and Professor at Texas Southern University, College of Science and Technology, Department of Computer Science, Houston, TX. He has published many research articles in refereed journals and IEEE conferences. He has more than 30 years of teaching and research experience. He has been General Chair, Session Chair, TPC Chair and Panelist in several conferences and acted as Reviewer and Guest Editor in referred journals. His research interest includes networks, computing and communication systems.
Chapter 1. Mitigating the Latency Induced Delay in IP Telephony through an Enhanced De-Jitter Buffer.- Chapter 2. A Cyber – Safety IoT Enabled Wearable Microstrip Antenna for X – Band applications.- Chapter 3. Keyword Recognition from EEG Signals on Smart Devices a Novel Approach.- Chapter 4. Security Analysis for Sybil Attack in Sensor Network using Compare and Match-Position Verification Method.- Chapter 5. Certain Strategic Study on Machine Learning based Graph Anomaly Detection.- Chapter 6. Machine Learning Perspective in VLSI Computer Aided Design at Different Abstraction Levels.- Chapter 7. A Practical Approach to Measure Data Center Efficiency using Power Usage Effectiveness.- Chapter 8. Advancing e-Government using Internet of Things.- Chapter 9. A New Network Forensic Investigation Process Model.- Chapter 10. MDTA : A New Approach of Supervised Machine Learning for Android Malware Detection And Threat Attribution using Behavioral Reports.- Chapter 11. Investigating the role ofuser Experience and Design in Recommender Systems: A Pragmatic Review.- Chapter 12. A Review on Intrusion Detection Approaches in Resource Constrained IoT Environment.- Chapter 13. The Future 5G Mobile Network Performance in Webservices with NDN Technology.- Chapter 14. Survey for Electroencephalography EEG signals Classification Approaches.- Chapter 15. Analysis of Road Accidents using Data Mining Paradigm.
Chapter 1. Mitigating the Latency Induced Delay in IP Telephony through an Enhanced De-Jitter Buffer.- Chapter 2. A Cyber - Safety IoT Enabled Wearable Microstrip Antenna for X - Band applications.- Chapter 3. Keyword Recognition from EEG Signals on Smart Devices a Novel Approach.- Chapter 4. Security Analysis for Sybil Attack in Sensor Network using Compare and Match-Position Verification Method.- Chapter 5. Certain Strategic Study on Machine Learning based Graph Anomaly Detection.- Chapter 6. Machine Learning Perspective in VLSI Computer Aided Design at Different Abstraction Levels.- Chapter 7. A Practical Approach to Measure Data Center Efficiency using Power Usage Effectiveness.- Chapter 8. Advancing e-Government using Internet of Things.- Chapter 9. A New Network Forensic Investigation Process Model.- Chapter 10. MDTA : A New Approach of Supervised Machine Learning for Android Malware Detection And Threat Attribution using Behavioral Reports.- Chapter 11. Investigating the role ofuser Experience and Design in Recommender Systems: A Pragmatic Review.- Chapter 12. A Review on Intrusion Detection Approaches in Resource Constrained IoT Environment.- Chapter 13. The Future 5G Mobile Network Performance in Webservices with NDN Technology.- Chapter 14. Survey for Electroencephalography EEG signals Classification Approaches.- Chapter 15. Analysis of Road Accidents using Data Mining Paradigm.
Chapter 1. Mitigating the Latency Induced Delay in IP Telephony through an Enhanced De-Jitter Buffer.- Chapter 2. A Cyber – Safety IoT Enabled Wearable Microstrip Antenna for X – Band applications.- Chapter 3. Keyword Recognition from EEG Signals on Smart Devices a Novel Approach.- Chapter 4. Security Analysis for Sybil Attack in Sensor Network using Compare and Match-Position Verification Method.- Chapter 5. Certain Strategic Study on Machine Learning based Graph Anomaly Detection.- Chapter 6. Machine Learning Perspective in VLSI Computer Aided Design at Different Abstraction Levels.- Chapter 7. A Practical Approach to Measure Data Center Efficiency using Power Usage Effectiveness.- Chapter 8. Advancing e-Government using Internet of Things.- Chapter 9. A New Network Forensic Investigation Process Model.- Chapter 10. MDTA : A New Approach of Supervised Machine Learning for Android Malware Detection And Threat Attribution using Behavioral Reports.- Chapter 11. Investigating the role ofuser Experience and Design in Recommender Systems: A Pragmatic Review.- Chapter 12. A Review on Intrusion Detection Approaches in Resource Constrained IoT Environment.- Chapter 13. The Future 5G Mobile Network Performance in Webservices with NDN Technology.- Chapter 14. Survey for Electroencephalography EEG signals Classification Approaches.- Chapter 15. Analysis of Road Accidents using Data Mining Paradigm.
Chapter 1. Mitigating the Latency Induced Delay in IP Telephony through an Enhanced De-Jitter Buffer.- Chapter 2. A Cyber - Safety IoT Enabled Wearable Microstrip Antenna for X - Band applications.- Chapter 3. Keyword Recognition from EEG Signals on Smart Devices a Novel Approach.- Chapter 4. Security Analysis for Sybil Attack in Sensor Network using Compare and Match-Position Verification Method.- Chapter 5. Certain Strategic Study on Machine Learning based Graph Anomaly Detection.- Chapter 6. Machine Learning Perspective in VLSI Computer Aided Design at Different Abstraction Levels.- Chapter 7. A Practical Approach to Measure Data Center Efficiency using Power Usage Effectiveness.- Chapter 8. Advancing e-Government using Internet of Things.- Chapter 9. A New Network Forensic Investigation Process Model.- Chapter 10. MDTA : A New Approach of Supervised Machine Learning for Android Malware Detection And Threat Attribution using Behavioral Reports.- Chapter 11. Investigating the role ofuser Experience and Design in Recommender Systems: A Pragmatic Review.- Chapter 12. A Review on Intrusion Detection Approaches in Resource Constrained IoT Environment.- Chapter 13. The Future 5G Mobile Network Performance in Webservices with NDN Technology.- Chapter 14. Survey for Electroencephalography EEG signals Classification Approaches.- Chapter 15. Analysis of Road Accidents using Data Mining Paradigm.