[FOX-Ebook]Communication, Networks and Computing: First International Conference, CNC 2018

¥34.99 市场价 ¥899.99
库存
9999
数量
-
+
联系卖家   QQ:316821785   微信:zbook8_com  电话:13111111111   
商品特色:担保交易手动发货商品,工作人员手动发货。

自动发货宝贝:购买后直接到我买到的商品-订单详情-收货信息获取下载链接。
手动发货宝贝:购买后请留言邮箱或联系方式,0-4小时内由工作人员发到您邮箱。
购买后任何问题请联系商家或直接联系本站站务微信或者QQ。
书籍格式:
isbn:
排版:
新旧程度:

-------如果这里没有任何信息,不是真没有,是我们懒!请复制书名上amazon搜索书籍信息。-------

Communication, Networks and Computing: First International Conference, CNC 2018, Gwalior, India, March 22-24, 2018, Revised Selected Papers (Communications in Computer and Information Science)

This book (CCIS 839) constitutes the refereed proceedings of the First International Conference on Communication, Networks and Computings, CNC 2018, held in Gwalior, India, in March 2018. The 70 full papers were carefully reviewed and selected from 182 submissions. The papers are organized in topical sections on wired and wireless communication systems, high dimensional data representation and processing, networks and information security, computing techniques for efficient networks design, electronic circuits for communication system.

Table of Contents

Chapter 1. Properties and Performance of Linearly Extensible Multiprocessor Interconnection Networks
Chapter 2. An Analysis on Improvement of Lifetime in Wireless Sensor Network
Chapter 3. A Novel Solution for Cloud Enabled E-Governance Using Openstack: Opportunities and Challenges
Chapter 4. Frequency of Meeting with Node and Visit to Physical Location Based on Mobility Pattern
Chapter 5. A New Lightweight Approach for Multiuser Searchable Encryption in the Cloud
Chapter 6. Performance Evaluation of Multi-functional Defected Ground Structure Embedded with Microstrip Patch Antenna for ISM Band Wireless Communications
Chapter 7. Evaluation of Character Recognition Algorithm Based on Feature Extraction
Chapter 8. A High Performance BPSK Trans Receiver Using Level Converter for Communication Systems
Chapter 9. Connectivity Analysis of Mobile Ad Hoc Network Using Fuzzy Logic Controller
Chapter 10. Improved Election of Cluster Head Using CH-PSO for Different Scenarios in VANET
Chapter 11. Utilizing Clustering Techniques for Improving the Boxplots
Chapter 12. Mathematical Model for Sink Mobility (MMSM) in Wireless Sensor Networks to Improve Network Lifetime
Chapter 13. Detection of High Transmission Power Based Wormhole Attack Using Received Signal Strength Indicator (RSSI)
Chapter 14. Effective Data Storage Security with Efficient Computing in Cloud
Chapter 15. Privacy Preserving Multi Keyword Ranked Search with Context Sensitive Synonyms over the Encrypted Cloud Data
Chapter 16. .26em plus .1em minus .1emAn Optimized High Gain Microstrip Patch Array Antenna for Sensor Networks
Chapter 17. An Efficient Data Aggregation Algorithm with Gossiping for Smart Transportation System
Chapter 18. Lane Change in Roundabout for Reduced Trip Time
Chapter 19. Fundamental Survey of Map Reduce in Bigdata with Hadoop Environment
Chapter 20. Improve Tampered Image Using Watermarking Apply the Distance Matrix
Chapter 21. A Novel Approach for Image Fusion with Guided Filter Based on Feature Transform
Chapter 22. Man in the Middle Attack on NTRU Key Exchange
Chapter 23. Information Theoretic Analysis of Privacy in a Multiple Query-Response Based Differentially Private Framework
Chapter 24. Security in MQTT and CoAP Protocols of IOT’s Application Layer
Chapter 25. Forensic Analysis of a Virtual Android Phone
Chapter 26. Implementation of Security Algorithm and Achieving Energy Efficiency for Increasing Lifetime of Wireless Sensor Network
Chapter 27. Secure Portable Storage Drive: Secure Information Storage
Chapter 28. Performance Evaluation of Facenet on Low Resolution Face Images
Chapter 29. Grading and Defect Detection in Potatoes Using Deep Learning
Chapter 30. Rough Fuzzy Technique for Giant Cell Tumor Detection
Chapter 31. Face Recognition in Surveillance Video for Criminal Investigations: A Review
Chapter 32. Prototype to Control a Robot by Android System Remote Controller
Chapter 33. Plane-Wise Encryption Based Progressive Visual Cryptography for Gray Image
Chapter 34. An Advanced Throttled (ATH) Algorithm and Its Performance Analysis with Different Variants of Cloud Computing Load Balancing Algorithm
Chapter 35. Role of Cache Replacement Policies in High Performance Computing Systems: A Survey
Chapter 36. Edge Detection Techniques in Dental Radiographs (Sobel, T1FLS & IT2FLS)
Chapter 37. Review of Deep Learning Techniques for Object Detection and Classification
Chapter 38. Improved Symmetric Key Technique Using Randomization
Chapter 39. An Interpretable SVM Based Model for Cancer Prediction in Mammograms
Chapter 40. DPVO: Design Pattern Detection Using Vertex Ordering a Case Study in JHotDraw with Documentation to Improve Reusability
Chapter 41. Intelligent Aggregation for Ensemble LSTM
Chapter 42. Optimal Low Rank Tensor Factorization for Deep Learning
Chapter 43. Performance Analysis of Naive Bayes Computing Algorithm for Blood Donors Classification Problem
Chapter 44. Design of a Single-Ended 8T SRAM Cell for Low Power Applications
Chapter 45. Y-Shaped Cantilever Beam RF MEMS Switch for Lower the Actuation Voltage
Chapter 46. Concentric Circular Ring Arc Antenna at Dual Band for Ku Band Applications
Chapter 47. Design of Spider Shaped Microstrip Patch Antenna for IoT Application
Chapter 48. Design of Microstrip Polygon Shaped Patch Antenna for IoT Applications
Chapter 49. A Novel Microstrip Patch Antenna with Single Elliptical CSRR for Multiband Applications
Chapter 50. Analysis of Circular Ring Patch Antenna for Enhancement of Wide Bandwidth with Defected Ground Structure
Chapter 51. The Analysis of U Slotted Rectangular Patch with Geometric Series DGS for Triple Band Applications
Chapter 52. A Dual Band Coplanar Concentric Ring Patch Antenna for Ku Band Applications
Chapter 53. Optimal Design of CMOS Amplifier Circuits Using Whale Optimization Algorithm
Chapter 54. Reliability Analysis of Comparator: NBTI, PBTI, HCI, AGEING
Chapter 55. Sag Calculations in Transmission Line with Different Case Studies
Chapter 56. Dual Band Slotted Patch Microstrip Antenna Array Design for K Band Application
Chapter 57. A 6-Bit Low Power SAR ADC


暂无评价
暂时没有数据

交易规则

免责声明


1、本站所有分享材料(数据、资料)均为网友上传,如有侵犯您的任何权利,请您第一时间通过微信(zbook8_com) 、QQ(316821785)、 电话(13111111111)联系本站,本站将在24小时内回复您的诉求!谢谢!
2、本站所有商品,除特殊说明外,均为(电子版)Ebook,请购买分享内容前请务必注意。特殊商品有说明实物的,按照说明为准。

发货方式


1、自动:在上方保障服务中标有自动发货的宝贝,拍下后,将会自动收到来自卖家的宝贝获取(下载)链接   [个人中心->我的订单->点击订单 查看详情];
2、手动:未标有自动发货的的宝贝,拍下后,通过QQ或订单中的电话联系对方。

退款说明


1、描述:书籍描述(含标题)与实际不一致的(例:描述PDF,实际为epub、缺页少页、版本不符等);
2、链接:部分图书会给出链接,直接链接到官网或者其他站点,以便于提示,如与给出不符等;
3、发货:手动发货书籍,在卖家未发货前,已申请退款的;
4、其他:如质量方面的硬性常规问题等。
注:经核实符合上述任一,均支持退款,但卖家予以积极解决问题则除外。交易中的商品,卖家无法对描述进行修改!

注意事项


1、在未购买下前,双方在QQ上所商定的内容,亦可成为纠纷评判依据(商定与描述冲突时,商定为准);
2、在宝贝同时有网站演示与图片演示,且站演与图演不一致时,默认按图演作为纠纷评判依据(特别声明或有商定除外);
3、在没有"无任何正当退款依据"的前提下,写有"一旦售出,概不支持退款"等类似的声明,视为无效声明;
4、虽然交易产生纠纷的几率很小,但请尽量保留如聊天记录这样的重要信息,以防产生纠纷时便于网站工作人员介入快速处理。