Ubiquitous Communications and Network Computing Second EAI International Conference, Bangalore, India, February 8–10, 2019, Proceedings / edited by Navin Kumar, R. Venkatesha Prasad.

This book constitutes the refereed proceedings of the Second International Conference on Ubiquitous Communications and Network Computing, UBICNET 2019, held in Bangalore, India, in February 2019. The 19 full papers were selected from 52 submissions and are basically arranged in different sessions on...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Kumar, Navin (Editor), Venkatesha Prasad, R. (Editor)
Format: eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2019.
Edition:1st ed. 2019.
Series:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 276
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Performance Analysis of Femtocell on Channel Allocation
  • System Level Performance Analysis of designed LNA and Down Converter for IEEE 802.11ad Receiver
  • Optimizing the Wi-Fi Mesh Networks for Throughput Improvement
  • Direction finding capability in Bluetooth 5.1 standard
  • An investigation of transmission properties of double-exponential pulses in core-clad optical fibers for communication application
  • Hybrid Energy Efficient and QoS Aware Algorithm to Prolong IoT Network Lifetime
  • Data Integration and Management in Indian Poultry Sector
  • CA-RPL: A Clustered Additive Approach in RPL for IoT Based Scalable Networks
  • Implementation of Trilateration based Localization approach for tree monitoring in IoT
  • Expert System Design for Automated Prediction of Difficulties in Securing Airway in ICU and OT
  • A comparative study on load balancing algorithms in software defined networking
  • CloudSDN: Enabling SDN Framework for Security and Threat Analytics in Cloud Networks
  • NB-FTBM Model for Entity Trust Evaluation in Vehicular Ad Hoc Network Security
  • Threshold Cryptography based Light Weight Key Management Technique for Hierarchical WSNs
  • Denoising Epigraphical Estampages using Nested Run Length Count
  • Improving transition probability for detecting Hardware Trojan using weighted random patterns
  • Prefix tree based MapReduce approach for mining frequent subgraphs
  • A Taxonomy of Methods and Models used in Program Transformation and Parallelization
  • Time Bound Robot Mission Planning for Priority Machine Using Linear Temporal Logic for Multi Goals.