[Lecture Notes in Networks and Systems] Trends in Communication, Cloud, and Big Data Volume 99 (Proceedings of 3rd National Conference on CCB, 2018) || 🔍
Hiren Kumar Deva Sarma (editor), Bhaskar Bhuyan (editor), Samarjeet Borah (editor), Nitul Dutta (editor) Springer Singapore : Imprint: Springer, 10.1007/97, 2020
英语 [en] · PDF · 5.6MB · 2020 · 📘 非小说类图书 · 🚀/lgli/lgrs/scihub/zlib · Save
描述
This book presents the outcomes of the Third National Conference on Communication, Cloud and Big Data (CCB) held on November 2–3, 2018, at Sikkim Manipal Institute of Technology, Majitar, Sikkim. Featuring a number of papers from the conference, it explores various aspects of communication, computation, cloud, and big data, including routing in cognitive radio wireless sensor networks, big data security issues, routing in ad hoc networks, routing protocol for Internet of things (IoT), and algorithm for imaging quality enhancement.
备用文件名
lgrsnf/2893.pdf
备用文件名
scihub/10.1007/978-981-15-1624-5.pdf
备用文件名
zlib/no-category/Sarma, Hiren Kumar Deva; Bhuyan, Bhaskar; Borah, Samarjeet; Dutta, Nitul/[Lecture Notes in Networks and Systems] Trends in Communication, Cloud, and Big Data Volume 99 (Proceedings of 3rd National Conference on CCB, 2018) ||_110444417.pdf
备选标题
Trends in Communication, Cloud, and Big Data: Proceedings of 3rd National Conference on CCB, 2018 (Lecture Notes in Networks and Systems Book 99)
备选作者
Sarma, Hiren Kumar Deva; Bhuyan, Bhaskar; Borah, Samarjeet; Dutta, Nitul
备选作者
National Conference on Communication, Cloud and Big Data
备用出版商
Springer Nature Singapore Pte Ltd Fka Springer Science + Business Media Singapore Pte Ltd
备用版本
Lecture Notes in Networks and Systems, 1st ed. 2020, Singapore, Singapore, 2020
备用版本
Lecture notes in networks and systems, v. 99, Singapore, 2020
备用版本
Springer Nature, Singapore, 2020
备用版本
Jan 03, 2020
元数据中的注释
sm80124790
元数据中的注释
Source title: Trends in Communication, Cloud, and Big Data: Proceedings of 3rd National Conference on CCB, 2018 (Lecture Notes in Networks and Systems)
备用描述
Preface
Contents
Editors and Contributors
Communication
Routing Protocols for CRAHN: A Comparative Evaluation
1 Introduction
2 Architecture of CRN
3 Routing in CRN
4 Routing Protocols for CRNs
5 Challenges and Issues of Routing Protocol in CRN
6 Different Approaches to Solve Various Issues Associated with CRN
7 Conclusion
References
EERP: Energy-Efficient Routing Protocol Performance Analysis of DSR and AODV for Mobile Adhoc Network
1 Introduction
2 Review of Literature
3 EERP System Model
3.1 EERP Energy Model
4 Result and Analysis
5 Conclusion and Future Research Direction
References
Mathematical Modeling of Mobility Models used in IP-Based Wireless Mobile Networks
1 Introduction
2 Mobility Models
2.1 Fluid-Flow Mobility Model
2.2 Random Waypoint Model
2.3 The Gauss–Markov Mobility Model
2.4 The Brownian Motion Mobility Model
2.5 Markovian Waypoint Mobility Model (MWP)
3 Discussions
4 Conclusion
References
A Game Theory-Based Framework for Reliable and Energy-Efficient Data Delivery in Cognitive Radio Wireless Sensor Network
1 Introduction
2 Related Work
3 Proposed Framework
4 Implementation Plan
5 Conclusion
References
Routing Techniques in Internet of Things: A Review
1 Introduction
2 Importance of Routing in IoT
3 Challenges in Routing in IoT
4 Survey on Some Existing Routing Protocols of IoT
5 Open Issues Related to Routing in IoT
6 Conclusion
References
Cloud
Cloud Detection and Cloud Removal of Satellite Image—A Case Study
1 Introduction
2 Thresholds
3 Model of the Proposed Method
4 Information Extractions
5 Colour Conversion
6 Pixel-to-Pixel Correction
7 Cloud Detection
7.1 Procedure of Cloud Detection Algorithm
8 Cloud Removal
8.1 Algorithm for Cloud Removal
9 Conclusion
9.1 Limitation
9.2 Future Work
References
Big Data
Security Issues in Big Data
1 Introduction
2 Big Data Environment
3 Security Fundamentals
4 Security Threats in Big Data
5 Technical Requirements in Order to Ensure Security in Big Data
6 Conclusion
References
Computation
Earth Mover’s Distance-Based Automated Geometric Visualization/Classification of Electrocardiogram Signals
1 Introduction
2 Methods
2.1 Tools and Technology
2.2 Data Collection
2.3 Earth Mover’s Distance (EMD) as a Base to Classify ECG Traces
3 Results
4 Discussion, Conclusion, and Future Scope
References
Pneumonia Identification in Chest X-Ray Images Using EMD
1 Introduction
2 Literature Review
3 EMD
4 Use of EMD in Pneumonia Detection
5 Implementation of EMD in X-Ray Images
6 Results
7 Future Prospects
References
Contemporary Linear Stochastic Models for Forecasting IoT Time Series Data
1 Introduction
1.1 Internet of Things (IoT)
1.2 IoT Data and Its Importance
1.3 Some Issues with IoT Data
1.4 Pre-processing the IoT Data
2 Time Series
2.1 Introduction to Time Series
2.2 Characteristics of a Time Series
3 Stochastic Forecasting
3.1 Introduction
3.2 Linear Models
4 Model Selection
5 Conclusions
References
A Journey from MD5 to SHA-3
1 Idea of a Message Digest or Hashing
2 Theoretical Background
2.1 MD5
2.2 SHA [Secure Hash Algorithm] Family
3 Application Area
3.1 Verifying the Integrity of Files or Messages
3.2 Password Verification
3.3 File or Data Identifier
4 Conclusion
References
An Approach to Achieve Compression Along with Security via a User Assigned Security Key with Possible Lossless Compression
1 Introduction
1.1 Encryption
1.2 Compression
1.3 The Problem of Piracy
1.4 DRM (Digital Rights Management)
2 The Scheme
3 Literature Survey
3.1 Objective of This Paper
3.2 Solution Strategy
4 An Implementation
4.1 Architecture Diagram
4.2 Detailed Diagram
4.3 Detail Process and Pseudo Codes
5 Results and Discussions
6 Limitations
7 Future Scope
8 Conclusions
References
Landslide Susceptibility Mapping: Development Towards a Machine Learning-Based Model
1 Introduction
1.1 Landslide Susceptibility Map
1.2 Landslide Causes
2 Related Works
3 Conclusion
References
Technology Enabled Smart Efficiency Parking System (TESEPS)
1 Introduction
2 Problem Definition
3 Proposed Solution Strategy
4 Design Strategy for the Solution
5 Working Principle
5.1 Arduino UNO
5.2 DC Motors
5.3 L298 Motor Driver H-Bridge Module
5.4 NFC V3 Module
6 Implementation and Result
7 Conclusion
References
CLEAN Algorithm for Imaging Quality Enhancement
1 Introduction
2 Clean Algorithm
3 Experimental Results
4 Conclusion
References
Context-Aware Song Recommendation System
1 Introduction
2 Related Works
3 Proposed Work
4 Result Set Analysis
5 Conclusion
References
Author Index
备用描述
Lecture Notes in Networks and Systems
Erscheinungsdatum: 03.01.2020
开源日期
2020-01-10
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。