You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents best selected papers presented at the International Conference on Emerging Wireless Communication Technologies and Information Security (EWCIS 2020), held from 8th & 9th October 2020 at Amity University Jharkhand, Ranchi, India. The book includes papers in the research area of wireless communications and intelligent systems, signal and image processing in engineering applications, data communication and information security, IoT and cloud computing. The contribution ranges from scientists, engineers and technologists from academia as well as from industry.
Analysis of big data is becoming a hot stuff for engineers, researchers and business enterprises now a days. It refers to the process of collecting, organizing and analyzing large sets of data to discover hidden patterns and other useful information. Not solely can massive information analytics assist to know the knowledge contained inside the information, however it will additionally facilitate to determine the information that is most significant to the business and future business choices. Cloud computing is the type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Cloud computing aims at applying traditio...
The idea of the 1st International Conference on Intelligent Computing and Applications (ICICA 2014) is to bring the Research Engineers, Scientists, Industrialists, Scholars and Students together from in and around the globe to present the on-going research activities and hence to encourage research interactions between universities and industries. The conference provides opportunities for the delegates to exchange new ideas, applications and experiences, to establish research relations and to find global partners for future collaboration. The proceedings covers latest progresses in the cutting-edge research on various research areas of Image, Language Processing, Computer Vision and Pattern ...
This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.
This volume constitutes the third of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 46 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on soft computing, such as AI, Neural Networks, Fuzzy Systems, etc.; distributed and parallel systems and algorithms; security and information assurance; ad hoc and ubiquitous computing; wireless ad hoc networks and sensor networks.
The Internet of Things (IoT) has seen the eventual shift to the "Internet of Everything" in the recent years, unveiling its ubiquitous presence spanning from smart transports to smart healthcare, from smart education to smart shopping. With the 5G rollouts across the different countries of the world, it raises newer perspectives toward the integration of 5G in IoT. For IoT-based smart devices, 5G not only means speed, but also better stability, efficiency, and more secure connectivity. The reach of 5G in IoT is extending in multifarious areas like self-driving vehicles, smart grids for renewable energy, AI-enabled robots on factory floors, intelligent healthcare services . . . The endless li...
This volume comprises select proceedings of ETAEERE-2016. The volume offers state-of-the-art chapters on energy management systems (EMS), renewable energy resources, micro-generation, green communications architectures and frameworks, green computing and education as well as energy-aware process optimization. The contents covers a wide variety of topics and aspects including management of renewable energy systems and environmental challenges. The contents of this volume will be useful to researchers and practicing engineers working in the areas of smart grids and renewable energy generation, distribution, and management.
This book is a collection of research articles and critical review articles, describing the overall approach to energy management. The book emphasizes the technical issues that drive energy efficiency in context of power systems. This book contains case studies with and without solutions on modelling, simulation and optimization techniques. It covers some innovative topics such as medium voltage (MV) back-to-back (BTB) system, cost optimization of a ring frame unit in textile industry, rectenna for radio frequency (RF) energy harvesting, ecology and energy dimension in infrastructural designs, 2.4 kW three-phase inverter for aircraft application, study of automatic generation control (AGC) in a two area hydrothermal power system, energy-efficient and reliable depth-based routing protocol for underwater wireless sensor network, and power line communication using LabVIEW. This book is primarily targeted at researchers and senior graduate students, but is also highly useful for the industry professional and scientists.
This volume constitutes the second of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 66 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on networks and communications; network and communications security; wireless and mobile networks.