International Conference on Wireless, Intelligent, and Distributed Environment for Communication: WIDECOM 2018: Lecture Notes on Data Engineering and Communications Technologies, cartea 18
Editat de Isaac Woungang, Sanjay Kumar Dhurandheren Limba Engleză Hardback – 18 apr 2018
The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book’s structure and content is organized in such a manner that makes it useful at a variety of learning levels.
- Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018;
- Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems;
- Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 789.36 lei 38-44 zile | |
Springer International Publishing – 19 dec 2018 | 789.36 lei 38-44 zile | |
Hardback (1) | 933.71 lei 43-57 zile | |
Springer International Publishing – 18 apr 2018 | 933.71 lei 43-57 zile |
Din seria Lecture Notes on Data Engineering and Communications Technologies
- 20% Preț: 1461.26 lei
- 20% Preț: 994.52 lei
- 18% Preț: 1545.11 lei
- 20% Preț: 695.92 lei
- 20% Preț: 1279.43 lei
- 20% Preț: 1011.91 lei
- 20% Preț: 1265.68 lei
- 20% Preț: 1267.32 lei
- 18% Preț: 1227.33 lei
- 20% Preț: 1268.10 lei
- 18% Preț: 1818.83 lei
- 15% Preț: 573.62 lei
- 20% Preț: 1756.25 lei
- 20% Preț: 1611.59 lei
- 18% Preț: 1388.17 lei
- 20% Preț: 1288.29 lei
- 20% Preț: 1433.29 lei
- 18% Preț: 1250.54 lei
- 20% Preț: 1263.26 lei
- 20% Preț: 1297.20 lei
- 20% Preț: 1641.48 lei
- 20% Preț: 1775.63 lei
- 20% Preț: 1639.88 lei
- 20% Preț: 1615.47 lei
- 20% Preț: 635.46 lei
- 20% Preț: 1419.08 lei
- 20% Preț: 1619.17 lei
- 20% Preț: 1027.45 lei
- 20% Preț: 817.15 lei
- 20% Preț: 1434.75 lei
- 20% Preț: 1274.72 lei
- 20% Preț: 681.39 lei
- 20% Preț: 804.22 lei
- 20% Preț: 630.16 lei
- 24% Preț: 907.54 lei
- 20% Preț: 1444.77 lei
- 20% Preț: 1433.29 lei
- 20% Preț: 800.84 lei
- 20% Preț: 1172.43 lei
- 18% Preț: 1386.16 lei
- 20% Preț: 1589.43 lei
- 20% Preț: 1131.21 lei
- 18% Preț: 1220.69 lei
Preț: 933.71 lei
Preț vechi: 1138.67 lei
-18% Nou
Puncte Express: 1401
Preț estimativ în valută:
178.69€ • 185.62$ • 148.43£
178.69€ • 185.62$ • 148.43£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319756257
ISBN-10: 3319756257
Pagini: 244
Ilustrații: XII, 334 p. 137 illus., 100 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.66 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes on Data Engineering and Communications Technologies
Locul publicării:Cham, Switzerland
ISBN-10: 3319756257
Pagini: 244
Ilustrații: XII, 334 p. 137 illus., 100 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.66 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes on Data Engineering and Communications Technologies
Locul publicării:Cham, Switzerland
Cuprins
Chapter1: Tamper Detection Using Fragile Image Watermarking Based on Chaotic System.- Chapter2: Cryptanalysis and Improvement of a User Authentication Scheme for SIP.- Chapter3: SECURITY AGAINST VAMPIRE ATTACK IN ADHOC WIRELESS SENSOR NETWORK: DETECTION & PREVENTION TECHNIQUES.- Chapter4: Securing Fuzzy Commitment Scheme against Decodability Attack based Cross-matching.- Chapter5: PiFallD: A Portable Fall Detection System.- Chapter6: Analysing, Designing, Implementation and Coding E-commerce through UX.- Chapter7: Performance evaluation of GAER over various crossover techniques in opportunistic networks.- Chapter8: Software Performance Measuring Benchmarks.-Chapter9: Texture Analysis of Fruits for its Deteriorated Classification.- Chapter10: Analysis of Packet Size Variation Supporting QoS for Survivable Optical High Speed Networks.- Chapter11: AN IMPROVED HYPRID ALGORITHM FOR WEB USAGE MINING.- Chapter12: Optimal Cache Placement by Identifying Possible Congestion Points in Wireless Sensor Networks.- Chapter13: Automatic Detection of Eczema Using Image Processing.- Chapter14: RECOGNITION OF EMOTIONS OF SPEECH AND MOOD OF MUSIC: A REVIEW.- Chapter15: Estimation of Probability Density Function of Digital Substrate Noise in Mixed Signal System.- Chapter16: Location Aware Data Distribution in P2P Mobile Cloud.- Chapter17: EPR: An Encounter and Probability based Routing Protocol for Opportunistic Networks.- Chapter18: Performance Comparison Simulation Model of Ad Hoc Cloud Network with Cloud Servers.- Chapter19: Path Restoration Versus Link Restoration in Survivable ATM Networks.- Chapter20: Adaptive Error Control Technique for Cluster based Underwater Wireless Sensor Networks.- Chapter21: Analysis of Basic Cognitive Radio and Queuing Based Request Handling.- Chapter22: Time Validity Based Message Transmission for College Activities.
Notă biografică
Professor Isaac Woungang received his Ph.D. degree in Mathematics from the University of South, Toulon and Var, France in 1994. From 1999 to 2002, he worked as a software engineer in the Photonic Line Systems Group, Nortel Networks, Ottawa, Ontario, Canada. Since 2002, he has been with Ryerson University, where he is now a full professor of Computer Science and Director of the Distributed Applications and Broadband (DABNEL) Lab. Dr. Woungang has published 8 books and over 89 refereed technical articles in scholarly international journals and proceedings of international conferences and symposiums. He has served as Associate Editor of the Computers and Electrical Engineering (Elsevier). He is currently serving as Associate Editor of the International Journal of Communication Systems (Wiley), and Security and Privacy Journal (Wiley). He has Guest Edited several Special Issues with various reputed journals such as IET Information Security, Mathematical and Computer Modeling (Elsevier),Computer Communications (Elsevier), Computers and Electrical Engineering (Elsevier), and Telecommunication Systems (Springer). He has also edited a book on “Routing in Opportunistic Networks”, by Springer. He is presently a Senior Member of IEEE; and he has served as Chair of Computer Chapter, IEEE Toronto Section, from January 2012 to September 2016.
Professor Sanjay Kumar Dhurandher received the M.Tech., and Ph.D. degrees in Computer Science from the Jawaharlal Nehru University, New Delhi, India. He is currently a Professor with the Division of Information Technology, Netaji Subhas Institute of Technology (NSIT), University of Delhi, New Delhi, India, where he is also the Head of the Information Technology Department. He is even serving as the Head of the Advanced Centre CAITFS, Division of Information Technology, NSIT, University of Delhi. From 1995 to 2000, he was a Scientist/Engineer with the Institute for Plasma Research, Gujarat, India, which is under the Department of Atomic Energy, India. His current research interests include wireless ad-hoc networks, sensor networks, computer networks, network security, underwater sensor networks, opportunistic networks, and cognitive radio networks. Dr. Dhurandher is currently serving as an Associate Editor for the International Journal of Communication Systems and Security and Privacy Journal by John Wiley & Sons. He has also edited a book on “Routing in Opportunistic Networks”, by Springer. He is presently a Senior Member of IEEE.
Professor Sanjay Kumar Dhurandher received the M.Tech., and Ph.D. degrees in Computer Science from the Jawaharlal Nehru University, New Delhi, India. He is currently a Professor with the Division of Information Technology, Netaji Subhas Institute of Technology (NSIT), University of Delhi, New Delhi, India, where he is also the Head of the Information Technology Department. He is even serving as the Head of the Advanced Centre CAITFS, Division of Information Technology, NSIT, University of Delhi. From 1995 to 2000, he was a Scientist/Engineer with the Institute for Plasma Research, Gujarat, India, which is under the Department of Atomic Energy, India. His current research interests include wireless ad-hoc networks, sensor networks, computer networks, network security, underwater sensor networks, opportunistic networks, and cognitive radio networks. Dr. Dhurandher is currently serving as an Associate Editor for the International Journal of Communication Systems and Security and Privacy Journal by John Wiley & Sons. He has also edited a book on “Routing in Opportunistic Networks”, by Springer. He is presently a Senior Member of IEEE.
Textul de pe ultima copertă
This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications.
The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book’s structure and content is organized in such a manner that makes it useful at a variety of learning levels.
The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book’s structure and content is organized in such a manner that makes it useful at a variety of learning levels.
- Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018;
- Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems;
- Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.
Caracteristici
Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018 Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems