000 05407nam a22006615i 4500
001 978-3-030-23943-5
003 DE-He213
005 20240423130124.0
007 cr nn 008mamaa
008 190713s2019 sz | s |||| 0|eng d
020 _a9783030239435
_9978-3-030-23943-5
024 7 _a10.1007/978-3-030-23943-5
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aEmerging Technologies in Computing
_h[electronic resource] :
_bSecond International Conference, iCETiC 2019, London, UK, August 19–20, 2019, Proceedings /
_cedited by Mahdi H. Miraz, Peter S. Excell, Andrew Ware, Safeeullah Soomro, Maaruf Ali.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXV, 316 p. 149 illus., 102 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-822X ;
_v285
505 0 _aPerformance Analytical Comparison of Blockchain-as-a-Service (BaaS) Platforms -- A Discussion on Blockchain Software Quality Attribute Design and Tradeoffs -- An Efficient Peer-to-Peer Bitcoin Protocol with Probabilistic Flooding -- Economic Impact of Resource Optimisation in Cloud Environment Using Different Virtual Machine Allocation Policies -- SOSE: Smart Offloading Scheme using Computing Resources of Nearby Wireless Devices for Edge Computing -- Security, Wireless Sensor Networks and Internet of Things (IoT) -- Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting -- A trust based mutual authentication and data encryption scheme for MANET security -- A Review and Survey on Smartphones: The Closest Enemy to Privacy -- Hybrid rule-based model for phishing URLs detection -- Smart Airports: Review and Open Research Issues -- Context-aware Indoor Environment Monitoring and Plant Prediction using Wireless Sensor Network -- Achieving Fairness by Using Dynamic Fragmentation and Buffer Size in Multihop Wireless Networks -- A Data Science Methodology for Internet-of-Things -- A comparison of the different types of risk perceived by users that are hindering the adoption of mobile payment -- Proposing a service quality framework for mobile commerce -- Sentiment Analysis in E-Commerce using SVM on Roman Urdu Text -- Prediction and Optimization of Export Opportunities Using Trade Data and Portfolio -- Automatic Speech Recognition in Taxi Call Service Systems -- Accuracy Comparison of Machine Learning Algorithms for Predictive Analytics in Higher Education -- Generic Framework of Knowledge-Based Learning: Designing and Deploying of Web Application -- The Bearing of Culture upon Intention to utilize Dlearning amongst Jordanian University Students: Modernizing with Emerging Technologies -- Tracking, Recognizing, and Estimating Size of Objects using Adaptive Technique -- Analysis Filling Factor Catalogue of Different Wavelength SODISM Images -- Building Energy Management System Based on Microcontrollers. .
520 _aThis book constitutes the refereed conference proceedings of the Second International Conference on Emerging Technologies in Computing, iCEtiC 2019, held in London, UK, in August 2019. The 24 revised full papers were reviewed and selected from 52 submissions and are organized in topical sections covering blockchain and cloud computing, security, wireless sensor networks and Internet of Things, (IoT), FinTech, AI, big data and data analytics.
650 0 _aComputer networks .
650 0 _aComputers, Special purpose.
650 0 _aElectronic digital computers
_xEvaluation.
650 0 _aData protection.
650 0 _aApplication software.
650 0 _aArtificial intelligence.
650 1 4 _aComputer Communication Networks.
650 2 4 _aSpecial Purpose and Application-Based Systems.
650 2 4 _aSystem Performance and Evaluation.
650 2 4 _aData and Information Security.
650 2 4 _aComputer and Information Systems Applications.
650 2 4 _aArtificial Intelligence.
700 1 _aMiraz, Mahdi H.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aExcell, Peter S.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWare, Andrew.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSoomro, Safeeullah.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aAli, Maaruf.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030239428
776 0 8 _iPrinted edition:
_z9783030239442
830 0 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-822X ;
_v285
856 4 0 _uhttps://doi.org/10.1007/978-3-030-23943-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNS
942 _cSPRINGER
999 _c185286
_d185286