000 | 04093nam a22005775i 4500 | ||
---|---|---|---|
999 |
_c200456874 _d75086 |
||
003 | TR-AnTOB | ||
005 | 20231115142428.0 | ||
007 | cr nn 008mamaa | ||
008 | 220521s2022 si | s |||| 0|eng d | ||
020 | _a9789811908989 | ||
024 | 7 |
_a10.1007/978-981-19-0898-9 _2doi |
|
040 |
_aTR-AnTOB _beng _erda _cTR-AnTOB |
||
041 | _aeng | ||
050 | 4 | _aTK5105.8857 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
090 | _aTK5105.8857EBK | ||
245 | 1 | 0 |
_aComputer Networks, Big Data and IoT _h[electronic resource] : _bProceedings of ICCBI 2021 / _cedited by A. Pasumpon Pandian, Xavier Fernando, Wang Haoxiang. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2022. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes on Data Engineering and Communications Technologies, _x2367-4520 ; _v117 |
|
505 | 0 | _aChapter 1. Rakshak – Prototype Application to Depict Crime Hotspot and Safest Path between locations -- Chapter 2. Block Chain Technology in Application Development and Associated Challenges -- Chapter 3. Hybrid Statistical and Deterministic Based Pedestrian Tracking Algorithm for Location-Based IoT Applications -- Chapter 4. MAC based Secure Data Transmission in Vehicular Adhoc Networks -- Chapter 5. A Study on Challenges in Data Security During Data Transformation -- Chapter 6. An Edge-based Disjoint Path Selection Scheme for FANETs -- Chapter 7. Sign Language Interpreter -- Chapter 8. Architectural Insight of Neural Information Extraction, Retrieval and Processing for Multi-Modal Neural Search -- Chapter 9. A Comparative Study Analysis on Air Monitoring and Purification Systems -- Chapter 10. Malicious Node Detection and Prevention for Secured Communication in WSN -- Chapter 11. Performance Analysis and Assessment of Various Energy Efficient Clustering based Protocols in WSN -- Chapter 12. Academic Data Analysis and Projection using Artificial Intelligence -- Chapter 13. Analysis of Factor Verification Affecting Recruitment Process through Social Dynamics -- Chapter 14. Routing Protocols in an Opportunistic Network: A Survey -- Chapter 15. K-Splits: Improved K-Means Clustering Algorithm to Automatically Detect the Number of Clusters. | |
520 | _aThis book presents best selected research papers presented at the International Conference on Computer Networks, Big Data and IoT (ICCBI 2021), organized by Vaigai College Engineering, Madurai, Tamil Nadu, India, during December 9–10, 2021. The book covers original papers on computer networks, network protocols and wireless networks, data communication technologies and network security. The book is a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers and industry practitioners in those important areas. | ||
650 | 0 | _aTelecommunication. | |
650 | 0 | _aInternet of things. | |
650 | 0 | _aBig data. | |
650 | 0 | _aCloud Computing. | |
650 | 1 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aInternet of Things. |
650 | 2 | 4 | _aBig Data. |
650 | 2 | 4 | _aCloud Computing. |
653 | 0 | _aInternet of things -- Congresses | |
653 | 0 | _aBig data -- Congresses | |
700 | 1 |
_aPandian, A. Pasumpon. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aFernando, Xavier. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aHaoxiang, Wang. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
830 | 0 |
_aLecture Notes on Data Engineering and Communications Technologies, _x2367-4520 ; _v117 |
|
856 | 4 | 0 |
_uhttps://doi.org/10.1007/978-981-19-0898-9 _3Springer eBooks _zOnline access link to the resource |
942 |
_2lcc _cEBK |