Ubiquitous Communications and Network Computing Second EAI International Conference, Bangalore, India, February 8-10, 2019, Proceedings /

This book constitutes the refereed proceedings of the Second International Conference on Ubiquitous Communications and Network Computing, UBICNET 2019, held in Bangalore, India, in February 2019. The 19 full papers were selected from 52 submissions and are basically arranged in different sessions on...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Kumar, Navin (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Venkatesha Prasad, R. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 276
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Performance Analysis of Femtocell on Channel Allocation
  • System Level Performance Analysis of designed LNA and Down Converter for IEEE 802.11ad Receiver
  • Optimizing the Wi-Fi Mesh Networks for Throughput Improvement
  • Direction finding capability in Bluetooth 5.1 standard
  • An investigation of transmission properties of double-exponential pulses in core-clad optical fibers for communication application
  • Hybrid Energy Efficient and QoS Aware Algorithm to Prolong IoT Network Lifetime
  • Data Integration and Management in Indian Poultry Sector
  • CA-RPL: A Clustered Additive Approach in RPL for IoT Based Scalable Networks
  • Implementation of Trilateration based Localization approach for tree monitoring in IoT
  • Expert System Design for Automated Prediction of Difficulties in Securing Airway in ICU and OT
  • A comparative study on load balancing algorithms in software defined networking
  • CloudSDN: Enabling SDN Framework for Security and Threat Analytics in Cloud Networks
  • NB-FTBM Model for Entity Trust Evaluation in Vehicular Ad Hoc Network Security
  • Threshold Cryptography based Light Weight Key Management Technique for Hierarchical WSNs
  • Denoising Epigraphical Estampages using Nested Run Length Count
  • Improving transition probability for detecting Hardware Trojan using weighted random patterns
  • Prefix tree based MapReduce approach for mining frequent subgraphs
  • A Taxonomy of Methods and Models used in Program Transformation and Parallelization
  • Time Bound Robot Mission Planning for Priority Machine Using Linear Temporal Logic for Multi Goals.