Jennifer S. Raj & Abdullah M. Iliyasu 
Innovative Data Communication Technologies and Application [PDF ebook] 
Proceedings of ICIDCA 2020

支持

This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented at the International Conference on Innovative Data Communication Technologies and Application (ICIDCA 2020), are included in the book. The book focuses on the theory, design, analysis, implementation and applications of distributed systems and networks.

€309.23
支付方式

表中的内容

A Study of Blending Ensembles for Detecting Bots on Twitter.- Design and Development of the robot for aquatic debris using smartphone.- A Framework for Data Analytics based Healthcare Systems.- Application Developed on Data Hiding Using Cryptography and Steganography.- Automated ERP System with Internet of Things.- Probability Density Analysis of Non-orthogonal Multiple Access over Rayleigh Channel using AF Relay.- Improved Synonym Queries bolstered by Encrypted Cloud Multi-watchword Ranked Search System.- Public Distribution System Based on Blockchain using Solidity.- Minimization of Sidelobe level of Uniformly Excited Concentric Circular Array Antenna using Evolutionary Technique.- Enhanced Compression Model for Brain MRI Images using Genetic Algorithm and Clustering Techniques.- Analysis of Farm Data using Artificial Intelligence.- A Review on Word Embedding Techniques for Text Classification.- Data Optimisation based Security Enhancement in 5G Edge Deployments.- Efficient Two Layer Image Protection with Wavelet Transform Compression.- Visualization of Data Structures with Animation of Code.- A Machine Learning Enabled Io T Device to Combat Elephant Mortality on Railway Tracks.- Retinal Image Diabetic Detection Using Multi Layer Perceptron Classifier.- A Quantum Machine Learning Classifier Model for Diabetes.- The Advent of Deep Learning based Image Forgery Detection Techniques.- Cloud Computing Adoption: Influencing Factors on Online Firms.- Change Detection in Remote Sensed Data by Particle Swarm Optimized Edge Detection Image Segmentation Technique.- An Enhanced Packet Delivery Ratio for Mobile Ad Hoc Networks Using Dcchsm Algorithm.

关于作者

Dr. Jennifer S Raj received the Ph.D. degree from Anna University and Master’s Degree in Communication System from SRM University, India. Currently, she is working in the Department of ECE, Gnanamani College of Technology, Namakkal, India. She is a life member of ISTE, India. She has been serving as Organizing Chair and Program Chair of several international conferences and in the Program Committees of several international conferences. She is book reviewer for Tata Mc Graw hill publication and publishes more than fifty research articles in the journals and IEEE conferences. Her interests are in wireless health care informatics and body area sensor networks.
Abdullah M. Iliyasu (aka Abdul M. Elias) received the M.E., Ph.D. and Dr. Eng. degrees in computational intelligence and intelligent systems engineering from the Tokyo Institute of Technology, Japan, where he is presently a Research Professor with the School of Computing. Concurrently, Prof. Elias is the Principal Investigator and Team Leader of the Advanced Computational Intelligence and Intelligent Systems Engineering (ACIISE) Research Group at the College of Engineering, Prince Sattam Bin Abdulaziz University in the Kingdom of Saudi Arabia. He is also a Professor with the School of Computer Science and Engineering, Changchun University of Science and Technology, China. He has to his credit more than 100 publications traversing the areas of computational intelligence, quantum cybernetics, quantum image processing, quantum machine learning, cyber and information security, hybrid intelligent systems, health informatics and electronics systems reliability.
Robert Bestak obtained Ph D degree in Computer Science from ENST Paris, France (2003) and MSc degree in Telecommunications from Czech Technical University in Prague, CTU, Czech Republic (1999). Since 2004, he has been an Assistant Professor at Department of Telecommunication Engineering, Faculty of Electrical Engineering, CTU. He participatedin several national, EU, and third party research projects. He is the Czech representative in the IFIP TC6 organization, and chair of working group TC6 WG6.8. He annually serves as Steering and Technical Program Committee member of numerous IEEE/IFIP conferences (Networking, WMNC, NGMAST, etc.) and he is member of editorial board of several international journals (Computers & Electrical Engineering, Electronic Commerce Research Journal, etc.). His research interests include 5G networks, spectrum management and big data in mobile networks. Dr Zubair Baig is a cyber security academic and expert who has over 85 research publications and 2 US patents to his credit. He has worked on national and international research projects such as the application of machine learning for design of intrusion detection systems, design of Blockchain solutions for securing national food supply chains for the United Nations/CSIRO, and the design and deployment of honeypot-based solutions for national-scale network security. He has delivered several keynote talks on cyber security both nationally and internationally and has appeared on Australian TV and Radio to provide expert opinion on numerous occasions.

购买此电子书可免费获赠一本!
语言 英语 ● 格式 PDF ● 网页 895 ● ISBN 9789811596513 ● 文件大小 28.1 MB ● 编辑 Jennifer S. Raj & Abdullah M. Iliyasu ● 出版者 Springer Singapore ● 市 Singapore ● 国家 SG ● 发布时间 2021 ● 下载 24 个月 ● 货币 EUR ● ID 7748222 ● 复制保护 社会DRM

来自同一作者的更多电子书 / 编辑

5,127 此类电子书