Mobile Computing and Sustainable Informatics (eBook, PDF)
Proceedings of ICMCSI 2022
234,33 €
inkl. MwSt.
Sofort per Download lieferbar
Mobile Computing and Sustainable Informatics (eBook, PDF)
Proceedings of ICMCSI 2022
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book gathers selected high-quality research papers presented at International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2022) organized by Pulchowk Campus, Institute of Engineering, Tribhuvan University, Nepal, during 27–28 January 2022. The book discusses recent developments in mobile communication technologies ranging from mobile edge computing devices, to personalized, embedded and sustainable applications. The book covers vital topics like mobile networks, computing models, algorithms, sustainable models and advanced informatics that supports the symbiosis of mobile computing and sustainable informatics.…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 25.11MB
- Upload möglich
Andere Kunden interessierten sich auch für
- Mobile Computing and Sustainable Informatics (eBook, PDF)255,73 €
- Mobile Computing and Sustainable Informatics (eBook, PDF)255,73 €
- Proceedings of the Sixth International Conference on Mathematics and Computing (eBook, PDF)213,99 €
- Second International Conference on Sustainable Technologies for Computational Intelligence (eBook, PDF)223,63 €
- Computational Intelligence in Pattern Recognition (eBook, PDF)223,63 €
- Advances in Data Computing, Communication and Security (eBook, PDF)234,33 €
- Soft Computing for Security Applications (eBook, PDF)213,99 €
-
-
-
This book gathers selected high-quality research papers presented at International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2022) organized by Pulchowk Campus, Institute of Engineering, Tribhuvan University, Nepal, during 27–28 January 2022. The book discusses recent developments in mobile communication technologies ranging from mobile edge computing devices, to personalized, embedded and sustainable applications. The book covers vital topics like mobile networks, computing models, algorithms, sustainable models and advanced informatics that supports the symbiosis of mobile computing and sustainable informatics.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Singapore
- Erscheinungstermin: 15. Juli 2022
- Englisch
- ISBN-13: 9789811920691
- Artikelnr.: 64361864
- Verlag: Springer Nature Singapore
- Erscheinungstermin: 15. Juli 2022
- Englisch
- ISBN-13: 9789811920691
- Artikelnr.: 64361864
Dr. Professor Subarna Shakya is currently Professor of Computer Engineering, Department of Electronics and Computer Engineering, Central Campus, Institute of Engineering, Pulchowk, Tribhuvan University, Coordinator (IOE), LEADER Project (Links in Europe and Asia for engineering, eDucation, Enterprise and Research exchanges), ERASMUS MUNDUS. He received M.Sc. and Ph.D. degrees in Computer Engineering from the Lviv Polytechnic National University, Ukraine, 1996 and 2000. respectively. His research area includes E-Government system, computer systems and simulation, distributed and cloud computing, software engineering and information system, computer architecture, information security for E-Government and multimedia system.
Dr. Klimis Ntalianis is Full Professor at the University of West Attica, Athens, GREECE. He has worked as Senior Researcher in multi-million research and development projects, funded by the General Secretariat of Research and Technology of Greece (GSRT), the Research Promotion Foundation of Cyprus (RPF), the Information Society S.A. of Greece and the European Union. He is also serving as Senior Project Proposal Evaluator for GSRT, RPF, the European Union, the Natural Sciences and Engineering Research Council of Canada and the National Science Center of Poland. In parallel, he is Member of several master theses and Ph.D. evaluation committees in Greece, Cyprus, Germany and India. He is also serving as Promotion Evaluator for Saudi Arabia's academic staff. He has served as General Chair in several conferences (IEEE, etc.). Dr. Ntalianis has published more than 160 scientific papers in international journals, books and conferences. His main research interests include social computing, multimedia analysis and information security.
Dr. Khaled A. Kamel is currently Chairman and Professor at Texas Southern university, College of Science and technology, Department of Computer Science, Houston, TX. He has published many research articles in refereed journals and IEEE conferences. He has more than 30 years of teaching and research experience. He has been General chair, Session Chair, TPC Chair and Panelist in several conferences and acted as Reviewer and Guest Editor in referred journals. His research interest includes networks, computing and communication systems.
Dr. Klimis Ntalianis is Full Professor at the University of West Attica, Athens, GREECE. He has worked as Senior Researcher in multi-million research and development projects, funded by the General Secretariat of Research and Technology of Greece (GSRT), the Research Promotion Foundation of Cyprus (RPF), the Information Society S.A. of Greece and the European Union. He is also serving as Senior Project Proposal Evaluator for GSRT, RPF, the European Union, the Natural Sciences and Engineering Research Council of Canada and the National Science Center of Poland. In parallel, he is Member of several master theses and Ph.D. evaluation committees in Greece, Cyprus, Germany and India. He is also serving as Promotion Evaluator for Saudi Arabia's academic staff. He has served as General Chair in several conferences (IEEE, etc.). Dr. Ntalianis has published more than 160 scientific papers in international journals, books and conferences. His main research interests include social computing, multimedia analysis and information security.
Dr. Khaled A. Kamel is currently Chairman and Professor at Texas Southern university, College of Science and technology, Department of Computer Science, Houston, TX. He has published many research articles in refereed journals and IEEE conferences. He has more than 30 years of teaching and research experience. He has been General chair, Session Chair, TPC Chair and Panelist in several conferences and acted as Reviewer and Guest Editor in referred journals. His research interest includes networks, computing and communication systems.
Chapter 1. XGBoost Design by Multi-verse Optimiser: An Application for Network Intrusion Detection.- Chapter 2. Gateway based Congestion Avoidance using Two-Hop Node in Wireless Sensor Networks.- Chapter 3. Stroke Prediction System using Machine Learning Algorithm.- Chapter 4. A Comprehensive Survey on Multilingual Opinion Mining.- Chapter 5. Development Features and Principles of Blockchain Technologies and Real Options as the Main Components of the Digital Economy.- Chapter 6. Technical Efficiency Analysis of China's Telecommunication Infrastructure :A Copula-based Meta-Stochastic Frontier Model.- Chapter 7. ATM Security using IRIS Recognition.- Chapter 8. Reliable Data Acquisition by Master Slave Approach in Marine-IoT Environment for Logistics.- Chapter 9. Mobile Technology Acceptance of University Students: A Consolidated Approach.- Chapter 10. Multistage Intrusion Detection System using Machine Learning Algorithm.- Chapter 11. Modeling Global Solar Radiation using Machine Learning with Model Selection Approach: a Case Study at Tanzania.- Chapter 12. Plant Disease Detection using Transfer Learning with DL Model.- Chapter 13. Tagging Fake Profiles in Twitter using Machine Learning Approach.- Chapter 14. A Machine-Learning System to Classify Cybercrime.- Chapter 15. Analyses of Non-Linear Effects with DCS and HOA Performance for 4 X 4 WDM / DWDM System. etc.
Chapter 1. XGBoost Design by Multi-verse Optimiser: An Application for Network Intrusion Detection.- Chapter 2. Gateway based Congestion Avoidance using Two-Hop Node in Wireless Sensor Networks.- Chapter 3. Stroke Prediction System using Machine Learning Algorithm.- Chapter 4. A Comprehensive Survey on Multilingual Opinion Mining.- Chapter 5. Development Features and Principles of Blockchain Technologies and Real Options as the Main Components of the Digital Economy.- Chapter 6. Technical Efficiency Analysis of China's Telecommunication Infrastructure :A Copula-based Meta-Stochastic Frontier Model.- Chapter 7. ATM Security using IRIS Recognition.- Chapter 8. Reliable Data Acquisition by Master Slave Approach in Marine-IoT Environment for Logistics.- Chapter 9. Mobile Technology Acceptance of University Students: A Consolidated Approach.- Chapter 10. Multistage Intrusion Detection System using Machine Learning Algorithm.- Chapter 11. Modeling Global Solar Radiation using Machine Learning with Model Selection Approach: a Case Study at Tanzania.- Chapter 12. Plant Disease Detection using Transfer Learning with DL Model.- Chapter 13. Tagging Fake Profiles in Twitter using Machine Learning Approach.- Chapter 14. A Machine-Learning System to Classify Cybercrime.- Chapter 15. Analyses of Non-Linear Effects with DCS and HOA Performance for 4 X 4 WDM / DWDM System. etc.
Chapter 1. XGBoost Design by Multi-verse Optimiser: An Application for Network Intrusion Detection.- Chapter 2. Gateway based Congestion Avoidance using Two-Hop Node in Wireless Sensor Networks.- Chapter 3. Stroke Prediction System using Machine Learning Algorithm.- Chapter 4. A Comprehensive Survey on Multilingual Opinion Mining.- Chapter 5. Development Features and Principles of Blockchain Technologies and Real Options as the Main Components of the Digital Economy.- Chapter 6. Technical Efficiency Analysis of China's Telecommunication Infrastructure :A Copula-based Meta-Stochastic Frontier Model.- Chapter 7. ATM Security using IRIS Recognition.- Chapter 8. Reliable Data Acquisition by Master Slave Approach in Marine-IoT Environment for Logistics.- Chapter 9. Mobile Technology Acceptance of University Students: A Consolidated Approach.- Chapter 10. Multistage Intrusion Detection System using Machine Learning Algorithm.- Chapter 11. Modeling Global Solar Radiation using Machine Learning with Model Selection Approach: a Case Study at Tanzania.- Chapter 12. Plant Disease Detection using Transfer Learning with DL Model.- Chapter 13. Tagging Fake Profiles in Twitter using Machine Learning Approach.- Chapter 14. A Machine-Learning System to Classify Cybercrime.- Chapter 15. Analyses of Non-Linear Effects with DCS and HOA Performance for 4 X 4 WDM / DWDM System. etc.
Chapter 1. XGBoost Design by Multi-verse Optimiser: An Application for Network Intrusion Detection.- Chapter 2. Gateway based Congestion Avoidance using Two-Hop Node in Wireless Sensor Networks.- Chapter 3. Stroke Prediction System using Machine Learning Algorithm.- Chapter 4. A Comprehensive Survey on Multilingual Opinion Mining.- Chapter 5. Development Features and Principles of Blockchain Technologies and Real Options as the Main Components of the Digital Economy.- Chapter 6. Technical Efficiency Analysis of China's Telecommunication Infrastructure :A Copula-based Meta-Stochastic Frontier Model.- Chapter 7. ATM Security using IRIS Recognition.- Chapter 8. Reliable Data Acquisition by Master Slave Approach in Marine-IoT Environment for Logistics.- Chapter 9. Mobile Technology Acceptance of University Students: A Consolidated Approach.- Chapter 10. Multistage Intrusion Detection System using Machine Learning Algorithm.- Chapter 11. Modeling Global Solar Radiation using Machine Learning with Model Selection Approach: a Case Study at Tanzania.- Chapter 12. Plant Disease Detection using Transfer Learning with DL Model.- Chapter 13. Tagging Fake Profiles in Twitter using Machine Learning Approach.- Chapter 14. A Machine-Learning System to Classify Cybercrime.- Chapter 15. Analyses of Non-Linear Effects with DCS and HOA Performance for 4 X 4 WDM / DWDM System. etc.