000 | 05407nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-030-23943-5 | ||
003 | DE-He213 | ||
005 | 20240423130124.0 | ||
007 | cr nn 008mamaa | ||
008 | 190713s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030239435 _9978-3-030-23943-5 |
||
024 | 7 |
_a10.1007/978-3-030-23943-5 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aEmerging Technologies in Computing _h[electronic resource] : _bSecond International Conference, iCETiC 2019, London, UK, August 19–20, 2019, Proceedings / _cedited by Mahdi H. Miraz, Peter S. Excell, Andrew Ware, Safeeullah Soomro, Maaruf Ali. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXV, 316 p. 149 illus., 102 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v285 |
|
505 | 0 | _aPerformance Analytical Comparison of Blockchain-as-a-Service (BaaS) Platforms -- A Discussion on Blockchain Software Quality Attribute Design and Tradeoffs -- An Efficient Peer-to-Peer Bitcoin Protocol with Probabilistic Flooding -- Economic Impact of Resource Optimisation in Cloud Environment Using Different Virtual Machine Allocation Policies -- SOSE: Smart Offloading Scheme using Computing Resources of Nearby Wireless Devices for Edge Computing -- Security, Wireless Sensor Networks and Internet of Things (IoT) -- Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting -- A trust based mutual authentication and data encryption scheme for MANET security -- A Review and Survey on Smartphones: The Closest Enemy to Privacy -- Hybrid rule-based model for phishing URLs detection -- Smart Airports: Review and Open Research Issues -- Context-aware Indoor Environment Monitoring and Plant Prediction using Wireless Sensor Network -- Achieving Fairness by Using Dynamic Fragmentation and Buffer Size in Multihop Wireless Networks -- A Data Science Methodology for Internet-of-Things -- A comparison of the different types of risk perceived by users that are hindering the adoption of mobile payment -- Proposing a service quality framework for mobile commerce -- Sentiment Analysis in E-Commerce using SVM on Roman Urdu Text -- Prediction and Optimization of Export Opportunities Using Trade Data and Portfolio -- Automatic Speech Recognition in Taxi Call Service Systems -- Accuracy Comparison of Machine Learning Algorithms for Predictive Analytics in Higher Education -- Generic Framework of Knowledge-Based Learning: Designing and Deploying of Web Application -- The Bearing of Culture upon Intention to utilize Dlearning amongst Jordanian University Students: Modernizing with Emerging Technologies -- Tracking, Recognizing, and Estimating Size of Objects using Adaptive Technique -- Analysis Filling Factor Catalogue of Different Wavelength SODISM Images -- Building Energy Management System Based on Microcontrollers. . | |
520 | _aThis book constitutes the refereed conference proceedings of the Second International Conference on Emerging Technologies in Computing, iCEtiC 2019, held in London, UK, in August 2019. The 24 revised full papers were reviewed and selected from 52 submissions and are organized in topical sections covering blockchain and cloud computing, security, wireless sensor networks and Internet of Things, (IoT), FinTech, AI, big data and data analytics. | ||
650 | 0 | _aComputer networks . | |
650 | 0 | _aComputers, Special purpose. | |
650 | 0 |
_aElectronic digital computers _xEvaluation. |
|
650 | 0 | _aData protection. | |
650 | 0 | _aApplication software. | |
650 | 0 | _aArtificial intelligence. | |
650 | 1 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSpecial Purpose and Application-Based Systems. |
650 | 2 | 4 | _aSystem Performance and Evaluation. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aArtificial Intelligence. |
700 | 1 |
_aMiraz, Mahdi H. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aExcell, Peter S. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aWare, Andrew. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSoomro, Safeeullah. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aAli, Maaruf. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030239428 |
776 | 0 | 8 |
_iPrinted edition: _z9783030239442 |
830 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v285 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-23943-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNS | ||
942 | _cSPRINGER | ||
999 |
_c185286 _d185286 |